{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:28:35Z","timestamp":1772724515250,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T00:00:00Z","timestamp":1653609600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T00:00:00Z","timestamp":1653609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s12083-022-01330-7","type":"journal-article","created":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T04:02:31Z","timestamp":1653624151000},"page":"1979-1993","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks"],"prefix":"10.1007","volume":"15","author":[{"given":"Xiaoyu","family":"Du","sequence":"first","affiliation":[]},{"given":"Yinyin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Sufang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,27]]},"reference":[{"key":"1330_CR1","doi-asserted-by":"crossref","unstructured":"Ismail A, Bagula BA , Tuyishimire E (2018) Internet-of-things in motion: A UAV coalition model for remote sensing in smart cities. Sensors\u00a018(7)","DOI":"10.3390\/s18072184"},{"key":"1330_CR2","doi-asserted-by":"publisher","first-page":"74175","DOI":"10.1109\/ACCESS.2020.2987622","volume":"8","author":"C Xu","year":"2020","unstructured":"Xu C, Liao X, Tan J, Ye H, Lu H (2020) Recent research progress of unmanned aerial vehicle regulation policies and technologies in urban low altitude. IEEE Access 8:74175\u201374194. https:\/\/doi.org\/10.1109\/ACCESS.2020.2987622","journal-title":"IEEE Access"},{"key":"1330_CR3","doi-asserted-by":"publisher","unstructured":"Shao Z, Cheng G, Ma J, Wang Z et al. Real-time and Accurate UAV pedestrian detection for social distancing monitoring in COVID-19 pandemic. IEEE Trans Multimed.\u00a0https:\/\/doi.org\/10.1109\/TMM.2021.3075566","DOI":"10.1109\/TMM.2021.3075566"},{"key":"1330_CR4","doi-asserted-by":"crossref","unstructured":"Zhao J, Gao F, Ding G et al (2018) Integrating Communications and Control for UAV Systems: Opportunities and Challenges. IEEE Access 1\u20131","DOI":"10.1109\/ACCESS.2018.2879637"},{"key":"1330_CR5","doi-asserted-by":"publisher","first-page":"46927","DOI":"10.1109\/ACCESS.2021.3066778","volume":"9","author":"A Shafique","year":"2021","unstructured":"Shafique A, Mehmood A, Elhadef M (2021) Survey of security protocols and vulnerabilities in unmanned aerial vehicles. IEEE Access 9:46927\u201346948. https:\/\/doi.org\/10.1109\/ACCESS.2021.3066778","journal-title":"IEEE Access"},{"key":"1330_CR6","volume-title":"Drone Technology: Types, Payloads, Applications","author":"B Vergouw","year":"2016","unstructured":"Vergouw B, Nagel H, Bondt G, Custers B (2016) Drone technology: types, payloads, applications. asser press, frequency spectrum issues and future developments. T.M.C"},{"key":"1330_CR7","doi-asserted-by":"crossref","unstructured":"Saharan S, Bawa S, Kumar N (2019) Dynamic pricing techniques for Intelligent Transportation System in smart cities: A systematic review. Comput Commun\u00a0150","DOI":"10.1016\/j.comcom.2019.12.003"},{"key":"1330_CR8","doi-asserted-by":"crossref","unstructured":"Guo W, Devine C, Wang S (2014) Performance analysis of micro unmanned airborne communication relays for cellular networks. Int Symp Commun Syst\u00a0658\u2013663","DOI":"10.1109\/CSNDSP.2014.6923909"},{"key":"1330_CR9","doi-asserted-by":"crossref","unstructured":"Alsamhi SH, Ansari O, Ansari SM, Gupta SK (2019) Collaboration of drone and internet of public safety things in smart cities: An overview of QoS and network performance optimization. Drones","DOI":"10.3390\/drones3010013"},{"key":"1330_CR10","doi-asserted-by":"crossref","unstructured":"Li W, Meese C, Guo H et al (2020) Blockchain-enabled identity verification for safe ridesharing leveraging zero-knowledge proof. CoRR\u00a018\u201324","DOI":"10.1109\/HotICN50779.2020.9350858"},{"issue":"5","key":"1330_CR11","doi-asserted-by":"publisher","first-page":"5403","DOI":"10.1109\/TVT.2020.2977829","volume":"69","author":"L Song","year":"2020","unstructured":"Song L, Sun G, Yu H et al (2020) FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles. IEEE Trans Veh Technol 69(5):5403\u20135415","journal-title":"IEEE Trans Veh Technol"},{"key":"1330_CR12","doi-asserted-by":"crossref","unstructured":"Bayat M, Barmshoory M, Rahimi M et al (2015) A secure authentication scheme for VANETs with batch verification. Wirel Netw","DOI":"10.1007\/s11276-014-0881-0"},{"issue":"3","key":"1330_CR13","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He D, Ma M, Zhang Y et al (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367\u2013374","journal-title":"Comput Commun"},{"issue":"Feb.","key":"1330_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2015.12.003","volume":"62","author":"P Gope","year":"2016","unstructured":"Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62(Feb.):1\u20138","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"1330_CR15","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/COMST.2015.2495297","volume":"18","author":"L Gupta","year":"2016","unstructured":"Gupta L, Jain R, Vaszkun G (2016) Survey of Important Issues in UAV Communication Networks. EEE Commun Surv Tutor 18(2):1123\u20131152","journal-title":"EEE Commun Surv Tutor"},{"issue":"1","key":"1330_CR16","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCOM.2017.1700390","volume":"56","author":"C Lin","year":"2018","unstructured":"Lin C, He D, Kumar N et al (2018) Security and privacy for the Internet of Drones: Challenges and solutions. IEEE Commun Mag 56(1):64\u201369","journal-title":"IEEE Commun Mag"},{"key":"1330_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.06.010","volume":"48","author":"Y Tian","year":"2019","unstructured":"Tian Y, Yuan J, Song H (2019) Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J Inf Secur Appl 48:102354","journal-title":"Journal of Information Security and Applications"},{"issue":"005","key":"1330_CR18","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/CC.2018.8387987","volume":"15","author":"L Chen","year":"2018","unstructured":"Chen L, Qian S, Ming L et al (2018) An enhanced direct anonymous attestation scheme with mutual authentication\u00a0for network-connected UAV communication systems. China Commun 15(005):61\u201376","journal-title":"China Commun"},{"key":"1330_CR19","doi-asserted-by":"crossref","unstructured":"Semal B, Markantonakis K, Akram RN (2018) A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. 2018 IEEE\/AIAA 37th Digital Avionics Systems Conference (DASC)","DOI":"10.1109\/DASC.2018.8569730"},{"key":"1330_CR20","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.comcom.2020.02.067","volume":"154","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, He D, Li L, Chen B (2020) A lightweight authentication and key agreement scheme for Internet of Drones. Comput Commun 154:455\u2013464","journal-title":"Comput Commun"},{"key":"1330_CR21","doi-asserted-by":"crossref","unstructured":"Gope P, Sikdar B (2020) An efficient privacy-preserving authenticated key agreement scheme for edge-assisted Internet of Drones. IEEE Trans Veh Technol","DOI":"10.1109\/TVT.2020.3018778"},{"key":"1330_CR22","unstructured":"Jangirala S, Das AK, Kumar N et al (2019) TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of Drones environment. IEEE Trans Veh Technol\u00a01\u20131"},{"key":"1330_CR23","unstructured":"Wazid M, Das AK, Kumar N et al (2018) Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of Drones Deployment. IEEE Internet Things J\u00a01\u20131"},{"key":"1330_CR24","first-page":"1","volume":"99","author":"M Yahuza","year":"2021","unstructured":"Yahuza M, Idris M, Wahab A et al (2021) An edge assisted secure lightweight authentication technique for safe communication on the Internet of Drones\u00a0network. IEEE Access 99:1\u20131","journal-title":"IEEE Access"},{"issue":"5","key":"1330_CR25","doi-asserted-by":"publisher","first-page":"3319","DOI":"10.1007\/s12083-021-01130-5","volume":"14","author":"N Zhang","year":"2021","unstructured":"Zhang N, Jiang Q, Li L et al (2021) An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones. Peer Peer Netw Appl 14(5):3319\u20133332","journal-title":"Peer Peer Netw Appl"},{"issue":"3, article 15","key":"1330_CR26","first-page":"66","volume":"4","author":"S Ganeriwal","year":"2004","unstructured":"Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. ACM Trans Sensor Netw 4(3, article 15):66\u201377","journal-title":"ACM Trans Sensor Netw"},{"issue":"005","key":"1330_CR27","first-page":"8","volume":"35","author":"YanB Liu","year":"2014","unstructured":"Liu YanB, Gong XueH, Feng YanF (2014) Trust evaluation method based on behavior detection of Internet of Things nodes. J Commun 35(005):8\u201315","journal-title":"J Commun"},{"key":"1330_CR28","doi-asserted-by":"crossref","unstructured":"Abderrahim OB, Elhdhili MH, Saidane L (2017) TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things. Wirel Commun Mob Comput Conf (IWCMC)\u00a0747\u2013752","DOI":"10.1109\/IWCMC.2017.7986378"},{"issue":"3","key":"1330_CR29","doi-asserted-by":"publisher","first-page":"5432","DOI":"10.1109\/JIOT.2019.2902022","volume":"6","author":"AA Adewuyi","year":"2019","unstructured":"Adewuyi AA, Cheng H, Shi Q, Cao J et al (2019) CTRUST: A dynamic trust model for collaborative applications in the Internet of Things. IEEE Internet Things J 6(3):5432\u20135445. https:\/\/doi.org\/10.1109\/JIOT.2019.2902022","journal-title":"IEEE Internet Things J"},{"key":"1330_CR30","doi-asserted-by":"crossref","unstructured":"Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol\u00a0361\u2013396","DOI":"10.1007\/s001450010003"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01330-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01330-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01330-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:08:42Z","timestamp":1744200522000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01330-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,27]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["1330"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01330-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,27]]},"assertion":[{"value":"12 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}