{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:25:07Z","timestamp":1757611507038,"version":"3.44.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-024-05080-4","type":"journal-article","created":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T15:10:23Z","timestamp":1751555423000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel communication resources-aware consensus algorithm for blockchain-based key management scheme to secure clustered FANETs"],"prefix":"10.1007","volume":"28","author":[{"given":"Maroua","family":"Abdelhafidh","sequence":"first","affiliation":[]},{"given":"Adel Ben","family":"Mnaouer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,3]]},"reference":[{"key":"5080_CR1","volume-title":"Introduction to UAV Systems","author":"PG Fahlstrom","year":"2022","unstructured":"Fahlstrom, P.G., Gleason, T.J., Sadraey, M.H.: Introduction to UAV Systems. Wiley, Hoboken (2022)"},{"key":"5080_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100359","volume":"39","author":"A Srivastava","year":"2021","unstructured":"Srivastava, A., Prakash, J.: Future fanet with application and enabling techniques: anatomization and sustainability issues. Comput. Sci. Rev. 39, 100359 (2021)","journal-title":"Comput. Sci. Rev."},{"issue":"4","key":"5080_CR3","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3991\/ijim.v16i04.28235","volume":"16","author":"AH Wheeb","year":"2022","unstructured":"Wheeb, A.H.: Flying ad hoc networks (fanet): performance evaluation of topology based routing protocols. Int. J. Interact. Mob. Technol. 16(4), 137\u2013149 (2022)","journal-title":"Int. J. Interact. Mob. Technol."},{"key":"5080_CR4","doi-asserted-by":"crossref","unstructured":"Qu, C., Sorbelli, F.B., Singh, R., Calyam, P., Das, S.K.: Environmentally-aware and energy-efficient multi-drone coordination and networking for disaster response. IEEE Transactions on Network and Service Management (2023)","DOI":"10.1109\/TNSM.2023.3243543"},{"key":"5080_CR5","doi-asserted-by":"crossref","unstructured":"Sari, T.T., Ahmad, S., Aral, A., Se\u00e7inti, G.: Collaborative smart environmental monitoring using flying edge intelligence. In: GLOBECOM 2023-2023 IEEE Global Communications Conference, pp. 5336\u20135341 (2023). IEEE","DOI":"10.1109\/GLOBECOM54140.2023.10436927"},{"key":"5080_CR6","doi-asserted-by":"crossref","unstructured":"Bashir, M.N., Iqbal, S., Yusof, K.M.: Design principles for cooperative relaying on uavs-based fanet. In: 2022 Advances in Science and Engineering Technology International Conferences (ASET), pp. 1\u20136 (2022). IEEE","DOI":"10.1109\/ASET53988.2022.9735058"},{"key":"5080_CR7","doi-asserted-by":"publisher","first-page":"105506","DOI":"10.1109\/ACCESS.2021.3097323","volume":"9","author":"M Aissa","year":"2021","unstructured":"Aissa, M., Abdelhafidh, M., Mnaouer, A.B.: Emass: a novel energy, safety and mobility aware-based clustering algorithm for fanets. IEEE Access 9, 105506\u2013105520 (2021)","journal-title":"IEEE Access"},{"issue":"3","key":"5080_CR8","doi-asserted-by":"publisher","first-page":"546","DOI":"10.3390\/electronics12030546","volume":"12","author":"Z Wenhua","year":"2023","unstructured":"Wenhua, Z., Qamar, F., Abdali, T.-A.N., Hassan, R., Jafri, S.T.A., Nguyen, Q.N.: Blockchain technology: security issues, healthcare applications, challenges and future trends. Electronics 12(3), 546 (2023)","journal-title":"Electronics"},{"key":"5080_CR9","doi-asserted-by":"crossref","unstructured":"Sharma, J., Mehra, P.S.: Secure communication in iot-based uav networks: a systematic survey. Int. Things, 100883 (2023)","DOI":"10.1016\/j.iot.2023.100883"},{"key":"5080_CR10","volume":"44","author":"M Hosseinzadeh","year":"2023","unstructured":"Hosseinzadeh, M., Mohammed, A.H., Alenizi, F.A., Malik, M.H., Yousefpoor, E., Yousefpoor, M.S., Ahmed, O.H., Rahmani, A.M., Tightiz, L.: A novel fuzzy trust-based secure routing scheme in flying ad hoc networks. Veh. Commun. 44, 100665 (2023)","journal-title":"Veh. Commun."},{"key":"5080_CR11","doi-asserted-by":"crossref","unstructured":"Abdelhafidh, M., Zaghdoud, N., Charef, N., Mnaouer, A.B.: Blockchain-based key management solution for clustered flying ad-hoc network. In: 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA), pp. 104\u2013111 (2023). IEEE","DOI":"10.1109\/BCCA58897.2023.10338935"},{"key":"5080_CR12","doi-asserted-by":"publisher","first-page":"5579","DOI":"10.1007\/s11276-019-02195-0","volume":"26","author":"S Wan","year":"2020","unstructured":"Wan, S., Li, M., Liu, G., Wang, C.: Recent advances in consensus protocols for blockchain: a survey. Wireless Netw. 26, 5579\u20135593 (2020)","journal-title":"Wireless Netw."},{"issue":"1","key":"5080_CR13","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1186\/s42400-023-00163-y","volume":"6","author":"Z Hussein","year":"2023","unstructured":"Hussein, Z., Salama, M.A., El-Rahman, S.A.: Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms. Cybersecurity 6(1), 30 (2023)","journal-title":"Cybersecurity"},{"key":"5080_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100065","volume":"3","author":"AK Jain","year":"2025","unstructured":"Jain, A.K., Gupta, N., Gupta, B.B.: A survey on scalable consensus algorithms for blockchain technology. Cyber Secur. Appl. 3, 100065 (2025)","journal-title":"Cyber Secur. Appl."},{"key":"5080_CR15","doi-asserted-by":"crossref","unstructured":"Wuthier, S., Chang, S.-Y.: Proof-of-work network simulator for blockchain and cryptocurrency research. In: 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), pp. 1098\u20131101 (2021). IEEE","DOI":"10.1109\/ICDCS51616.2021.00110"},{"key":"5080_CR16","doi-asserted-by":"crossref","unstructured":"Sriman, B., Ganesh\u00a0Kumar, S., Shamili, P.: Blockchain technology: Consensus protocol proof of work and proof of stake. In: Intelligent Computing and Applications: Proceedings of ICICA 2019, pp. 395\u2013406 (2021). Springer","DOI":"10.1007\/978-981-15-5566-4_34"},{"issue":"6","key":"5080_CR17","doi-asserted-by":"publisher","first-page":"2516","DOI":"10.1007\/s12083-022-01380-x","volume":"15","author":"F-Q Ma","year":"2022","unstructured":"Ma, F.-Q., Li, Q.-L., Liu, Y.-H., Chang, Y.-X.: Stochastic performance modeling for practical byzantine fault tolerance consensus in the blockchain. Peer-to-Peer Netw. Appl. 15(6), 2516\u20132528 (2022)","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"3","key":"5080_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MWC.002.2100594","volume":"29","author":"Y Tan","year":"2022","unstructured":"Tan, Y., Liu, J., Kato, N.: Blockchain-based lightweight authentication for resilient uav communications: architecture, scheme, and future directions. IEEE Wirel. Commun. 29(3), 24\u201331 (2022)","journal-title":"IEEE Wirel. Commun."},{"key":"5080_CR19","first-page":"1","volume":"44","author":"Q Jiang","year":"2022","unstructured":"Jiang, Q., Cai, M., Cheng, Q., Tian, Y., Ma, J.: Decentralized group key management scheme in hierarchical unmanned aerial vehicle network. J. Electron. Inf. Technol. 44, 1\u20139 (2022)","journal-title":"J. Electron. Inf. Technol."},{"issue":"2","key":"5080_CR20","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s12083-024-01624-y","volume":"17","author":"H Xie","year":"2024","unstructured":"Xie, H., Zheng, J., He, T., Wei, S., Hu, C.: A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for fanet. Peer-to-Peer Netw. Appl. 17(2), 569\u2013584 (2024)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"5080_CR21","doi-asserted-by":"crossref","unstructured":"Qureshi, K.N., Nafea, H.O., Tariq, I., Ghafoor, K.Z.: Blockchain-based trust and authentication model for detecting and isolating malicious nodes in flying ad hoc networks. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3425153"},{"issue":"1","key":"5080_CR22","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1515\/JMC.2009.004","volume":"3","author":"G Neven","year":"2009","unstructured":"Neven, G., Smart, N.P., Warinschi, B.: Hash function requirements for schnorr signatures. J. Math. Cryptol. 3(1), 69\u201387 (2009)","journal-title":"J. Math. Cryptol."},{"issue":"11","key":"5080_CR23","doi-asserted-by":"publisher","first-page":"11309","DOI":"10.1109\/TVT.2019.2943118","volume":"68","author":"X Li","year":"2019","unstructured":"Li, X., Wang, Y., Vijayakumar, P., He, D., Kumar, N., Ma, J.: Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network. IEEE Trans. Veh. Technol. 68(11), 11309\u201311322 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"5080_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3618302","volume":"2","author":"T Rajabi","year":"2023","unstructured":"Rajabi, T., Khalil, A.A., Manshaei, M.H., Rahman, M.A., Dakhilalian, M., Ngouen, M., Jadliwala, M., Uluagac, A.S.: Feasibility analysis for sybil attacks in shard-based permissionless blockchains. Distrib. Ledger Technol.: Res. Pract. 2(4), 1\u201321 (2023)","journal-title":"Distrib. Ledger Technol.: Res. Pract."},{"key":"5080_CR25","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.future.2017.09.023","volume":"107","author":"V Gramoli","year":"2020","unstructured":"Gramoli, V.: From blockchain consensus back to byzantine consensus. Futur. Gener. Comput. Syst. 107, 760\u2013769 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"8","key":"5080_CR26","doi-asserted-by":"publisher","first-page":"4727","DOI":"10.1109\/TSMC.2021.3104087","volume":"52","author":"P Ramanan","year":"2021","unstructured":"Ramanan, P., Li, D., Gebraeel, N.: Blockchain-based decentralized replay attack detection for large-scale power systems. IEEE Trans. Syst. Man Cybern. Syst. 52(8), 4727\u20134739 (2021)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"5080_CR27","doi-asserted-by":"crossref","unstructured":"Lateef, S., Rizwan, M., Hassan, M.A.: Security threats in flying ad hoc network (fanet). Computational Intelligence for Unmanned Aerial Vehicles Communication Networks, 73\u201396 (2022)","DOI":"10.1007\/978-3-030-97113-7_5"},{"issue":"6","key":"5080_CR28","doi-asserted-by":"publisher","first-page":"3765","DOI":"10.1109\/TITS.2020.3035869","volume":"22","author":"B Li","year":"2020","unstructured":"Li, B., Liang, R., Zhu, D., Chen, W., Lin, Q.: Blockchain-based trust management model for location privacy preserving in vanet. IEEE Trans. Intell. Transp. Syst. 22(6), 3765\u20133775 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5080_CR29","doi-asserted-by":"crossref","unstructured":"Fischlin, M., Fleischhacker, N.: Limitations of the meta-reduction technique: The case of schnorr signatures. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 444\u2013460 (2013). Springer","DOI":"10.1007\/978-3-642-38348-9_27"},{"key":"5080_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100254","volume":"11","author":"R Martino","year":"2020","unstructured":"Martino, R., Cilardo, A.: Designing a sha-256 processor for blockchain-based iot applications. Int. Things 11, 100254 (2020)","journal-title":"Int. Things"},{"issue":"4","key":"5080_CR31","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Commun. 1(4), 660\u2013670 (2002)","journal-title":"IEEE Trans. Wireless Commun."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05080-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05080-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05080-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T20:21:27Z","timestamp":1756930887000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05080-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5080"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05080-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,7,3]]},"assertion":[{"value":"15 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"411"}}