{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:07:27Z","timestamp":1770538047989,"version":"3.49.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032137562","type":"print"},{"value":"9783032137579","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-13757-9_17","type":"book-chapter","created":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T08:13:07Z","timestamp":1770451987000},"page":"229-241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ChLAP: Chaotic Based Lightweight Authentication Protocol for\u00a0Secure UAV Communication"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6628-1685","authenticated-orcid":false,"given":"Naveen","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7510-1963","authenticated-orcid":false,"given":"Ankit","family":"Chaudhary","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,8]]},"reference":[{"issue":"2","key":"17_CR1","doi-asserted-by":"publisher","first-page":"43","DOI":"10.3390\/info10020043","volume":"10","author":"A Abdallah","year":"2019","unstructured":"Abdallah, A., Ali, M.Z., Mi\u0161i\u0107, J., Mi\u0161i\u0107, V.B.: Efficient security scheme for disaster surveillance UAV communication networks. Information 10(2), 43 (2019)","journal-title":"Information"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"35579","DOI":"10.1109\/ACCESS.2019.2902221","volume":"7","author":"Z Fu","year":"2019","unstructured":"Fu, Z., Mao, Y., He, D., Yu, J., Xie, G.: Secure multi-UAV collaborative task allocation. IEEE Access 7, 35579\u201335587 (2019)","journal-title":"IEEE Access"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/ACCESS.2016.2537208","volume":"4","author":"M Gharibi","year":"2016","unstructured":"Gharibi, M., Boutaba, R., Waslander, S.L.: Internet of drones. IEEE Access 4, 1148\u20131162 (2016)","journal-title":"IEEE Access"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"H\u00e9non, M.: A two-dimensional mapping with a strange attractor. The theory of chaotic attractors, pp. 94\u2013102 (2004)","DOI":"10.1007\/978-0-387-21830-4_8"},{"key":"17_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101658","volume":"89","author":"J H\u00f6glund","year":"2020","unstructured":"H\u00f6glund, J., Lindemer, S., Furuhed, M., Raza, S.: Pki4iot: towards public key infrastructure for the internet of things. Comput. Secur. 89, 101658 (2020)","journal-title":"Comput. Secur."},{"issue":"6","key":"17_CR6","doi-asserted-by":"publisher","first-page":"2057","DOI":"10.3390\/s21062057","volume":"21","author":"Y Ko","year":"2021","unstructured":"Ko, Y., Kim, J., Duguma, D.G., Astillo, P.V., You, I., Pau, G.: Drone secure communication protocol for future sensitive applications in military zone. Sensors 21(6), 2057 (2021)","journal-title":"Sensors"},{"key":"17_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110695","volume":"252","author":"N Kumar","year":"2024","unstructured":"Kumar, N., Chaudhary, A.: Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security. Comput. Netw. 252, 110695 (2024)","journal-title":"Comput. Netw."},{"issue":"4","key":"17_CR8","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.3390\/s21041369","volume":"21","author":"H Lee","year":"2021","unstructured":"Lee, H., Yoon, J., Jang, M.S., Park, K.J.: A robot operating system framework for secure UAV communications. Sensors 21(4), 1369 (2021)","journal-title":"Sensors"},{"key":"17_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102935","volume":"142","author":"Y Liu","year":"2023","unstructured":"Liu, Y., Xia, Q., Li, X., Gao, J., Zhang, X.: An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity. J. Syst. Architect. 142, 102935 (2023)","journal-title":"J. Syst. Architect."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Mahmood, K., Ghaffar, Z., Farooq, M., Yahya, K., Das, A.K., Chaudhry, S.A.: A security enhanced chaotic-map based authentication protocol for internet of drones. IEEE Internet Things J. (2024)","DOI":"10.1109\/JIOT.2024.3379930"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Nyangaresi, V.O., Ahmad, M., Maghrabi, L.A., Althaqafi, T.: Cost-effective PUF and ECC based authentication protocol for secure internet of drones communication. IEEE Internet Things J. (2025)","DOI":"10.1109\/JIOT.2025.3576313"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Ozmen, M.O., Yavuz, A.A.: Dronecrypt-an efficient cryptographic framework for small aerial drones. In: MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), pp.\u00a01\u20136. IEEE (2018)","DOI":"10.1109\/MILCOM.2018.8599784"},{"issue":"12","key":"17_CR13","doi-asserted-by":"publisher","first-page":"9918","DOI":"10.1109\/JIOT.2022.3163367","volume":"9","author":"C Pu","year":"2022","unstructured":"Pu, C., Wall, A., Choo, K.K.R., Ahmed, I., Lim, S.: A lightweight and privacy-preserving mutual authentication and key agreement protocol for internet of drones environment. IEEE Internet Things J. 9(12), 9918\u20139933 (2022)","journal-title":"IEEE Internet Things J."},{"key":"17_CR14","volume":"1","author":"R Sc","year":"2023","unstructured":"Sc, R., Kr, K., et al.: Secure session key pairing and a lightweight key authentication scheme for liable drone services. Cyber Secur. Appl. 1, 100012 (2023)","journal-title":"Cyber Secur. Appl."},{"issue":"2","key":"17_CR15","doi-asserted-by":"publisher","first-page":"38","DOI":"10.3390\/technologies7020038","volume":"7","author":"A Silva-Juarez","year":"2019","unstructured":"Silva-Juarez, A., Rodriguez-Gomez, G., de la Fraga, L.G., Guillen-Fernandez, O., Tlelo-Cuautle, E.: Optimizing the Kaplan-Yorke dimension of chaotic oscillators applying de and PSO. Technologies 7(2), 38 (2019)","journal-title":"Technologies"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Vergouw, B., Nagel, H., Bondt, G., Custers, B.: Drone technology: types, payloads, applications, frequency spectrum issues and future developments. The future of drone use: opportunities and threats from ethical and legal perspectives, pp. 21\u201345 (2016)","DOI":"10.1007\/978-94-6265-132-6_2"},{"issue":"1","key":"17_CR17","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/drones6010010","volume":"6","author":"T Wu","year":"2021","unstructured":"Wu, T., Guo, X., Chen, Y., Kumari, S., Chen, C.: Amassing the security: an enhanced authentication protocol for drone communications over 5G networks. Drones 6(1), 10 (2021)","journal-title":"Drones"},{"key":"17_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100218","volume":"11","author":"JP Yaacoub","year":"2020","unstructured":"Yaacoub, J.P., Noura, H., Salman, O., Chehab, A.: Security analysis of drones systems: attacks, limitations, and recommendations. Internet of Things 11, 100218 (2020)","journal-title":"Internet of Things"},{"issue":"10","key":"17_CR19","doi-asserted-by":"publisher","first-page":"10374","DOI":"10.1109\/TVT.2022.3188769","volume":"71","author":"S Yu","year":"2022","unstructured":"Yu, S., Das, A.K., Park, Y., Lorenz, P.: Slap-IOD: secure and lightweight authentication protocol using physical unclonable functions for internet of drones in smart city environments. IEEE Trans. Veh. Technol. 71(10), 10374\u201310388 (2022)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"3319","DOI":"10.1007\/s12083-021-01130-5","volume":"14","author":"N Zhang","year":"2021","unstructured":"Zhang, N., Jiang, Q., Li, L., Ma, X., Ma, J.: An efficient three-factor remote user authentication protocol based on BPV-FOURQ for internet of drones. Peer-to-Peer Network. Appl. 14, 3319\u20133332 (2021)","journal-title":"Peer-to-Peer Network. Appl."},{"issue":"5","key":"17_CR21","doi-asserted-by":"publisher","first-page":"315","DOI":"10.3390\/drones7050315","volume":"7","author":"S Zhang","year":"2023","unstructured":"Zhang, S., Liu, Y., Han, Z., Yang, Z.: A lightweight authentication protocol for UAVs based on ECC scheme. Drones 7(5), 315 (2023)","journal-title":"Drones"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.comcom.2020.02.067","volume":"154","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., He, D., Li, L., Chen, B.: A lightweight authentication and key agreement scheme for internet of drones. Comput. Commun. 154, 455\u2013464 (2020)","journal-title":"Comput. Commun."},{"issue":"1","key":"17_CR23","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MWC.2018.1800160","volume":"26","author":"N Zhao","year":"2019","unstructured":"Zhao, N., et al.: UAV-assisted emergency networks in disasters. IEEE Wirel. Commun. 26(1), 45\u201351 (2019)","journal-title":"IEEE Wirel. Commun."}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-13757-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T08:13:09Z","timestamp":1770451989000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-13757-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032137562","9783032137579"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-13757-9_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"8 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}