{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T20:54:45Z","timestamp":1773435285198,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T00:00:00Z","timestamp":1696032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T00:00:00Z","timestamp":1696032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Kaifeng Science and Technology Development Plan","award":["2201010"],"award-info":[{"award-number":["2201010"]}]},{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62176088"],"award-info":[{"award-number":["62176088"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Special Project for Key R &D and the Promotion of Science, Technology Department of Henan Province","award":["222102210272"],"award-info":[{"award-number":["222102210272"]}]},{"name":"the Key Technology Research and Development Project of Henan Province under Grant","award":["222102210055"],"award-info":[{"award-number":["222102210055"]}]},{"name":"the Postgraduate Education Reform and Quality Improvement Project of Henan Province under Grant","award":["YJS2022JD26"],"award-info":[{"award-number":["YJS2022JD26"]}]},{"name":"the Major Science and Technology Projects of Henan Province, and the Major Public Welfare Projects of Henan Province","award":["201300210400"],"award-info":[{"award-number":["201300210400"]}]},{"name":"the Special Project for Key R &D and the Promotion of Science, Technology Department of Henan Province","award":["222102210007"],"award-info":[{"award-number":["222102210007"]}]},{"name":"the Special Project for Key R &D and the Promotion of Science, Technology Department of Henan Province","award":["222102210062"],"award-info":[{"award-number":["222102210062"]}]},{"name":"the Special Project for Key R &D and the Promotion of Science, Technology Department of Henan Province","award":["232102211009"],"award-info":[{"award-number":["232102211009"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Unmanned Aerial Vehicle (UAV) swarms not only expanded the application areas of UAVs but also brought more complex challenges to security. Both the data collected by UAVs and UAVs themselves are easy targets for hackers. Once a hacker has intercepted communication information or hijacked a UAV, it can cause the disclosure of information and even affect the normal flight of the UAV. In terms of authentication, existing research focuses on building peer-to-peer networks through devices that support blockchain deployments at the edge nodes to form blockchain networks. UAVs cannot run blockchains directly, so fog nodes need to be introduced to assist UAVs in achieving authentication. This paper proposes a UAV authentication solution based on the fog node-assisted blockchain. The solution incorporates smart contracts to ensure trust, along with on-chain registration and authentication for UAVs. In the design of this paper, the main use is made of fog nodes at the edge of each block. The fog nodes serve as agents to register and authenticate the UAVs in their area on the blockchain, thus enabling the authentication of UAVs in different fog node areas. In this paper, the analysis of gas consumption yields a total economic benefit cost of about <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\yen $$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mo>\u00a5<\/mml:mo>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> 12.77, which is negligible for the safety of the UAVs. Meanwhile, the paper compares the computational overheads, and within 10 UAVs, the computational overhead of this scheme is less than 50 ms, which is significantly lower than the other two schemes.<\/jats:p>","DOI":"10.1007\/s40747-023-01232-y","type":"journal-article","created":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T08:01:31Z","timestamp":1696060891000},"page":"1689-1702","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A blockchain authentication scheme for UAV-aided fog computing"],"prefix":"10.1007","volume":"10","author":[{"given":"Xiaoyu","family":"Du","sequence":"first","affiliation":[]},{"given":"Song","family":"Tao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9388-5690","authenticated-orcid":false,"given":"Ke","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Yinyin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,30]]},"reference":[{"key":"1232_CR1","doi-asserted-by":"publisher","DOI":"10.3390\/sym12020287","author":"BA Alzahrani","year":"2020","unstructured":"Alzahrani BA, Chaudhry SA, Barnawi A, Al-Barakati A, Alsharif MH (2020) A privacy preserving authentication scheme for roaming in IoT-based wireless mobile networks\u2019\u2019. Symmetry. https:\/\/doi.org\/10.3390\/sym12020287","journal-title":"Symmetry"},{"key":"1232_CR2","doi-asserted-by":"publisher","unstructured":"Yunmok S (2018) Noh, Juhwan, Choi, Jaeyeong, Kim, and Yongdae, \"GyrosFinger: Fingerprinting drones for location tracking based on the outputs of MEMS gyroscopes\". Acm Trans Privacy Secur 21(5):1\u201325. https:\/\/doi.org\/10.1145\/3177751","DOI":"10.1145\/3177751"},{"issue":"3","key":"1232_CR3","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1109\/COMST.2020.2989392","volume":"22","author":"K Gai","year":"2020","unstructured":"Gai K, Guo J, Zhu L, Yu S (2020) Blockchain Meets Cloud Computing: A Survey. IEEE Communications Surveys & Tutorials 22(3):2009\u20132030. https:\/\/doi.org\/10.1109\/COMST.2020.2989392","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1232_CR4","doi-asserted-by":"publisher","first-page":"156114","DOI":"10.1109\/ACCESS.2021.3129697","volume":"9","author":"EA Shammar","year":"2021","unstructured":"Shammar EA, Zahary AT, Al-Shargabi AA (2021) A Survey of IoT and Blockchain Integration: Security Perspective. IEEE Access 9:156114\u2013156150. https:\/\/doi.org\/10.1109\/ACCESS.2021.3129697","journal-title":"IEEE Access"},{"key":"1232_CR5","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1109\/COMST.2020.2989392","volume":"22","author":"K Gai","year":"2020","unstructured":"Gai K, Guo J, Zhu L, Yu S (2020) Blockchain Meets Cloud Computing: A Survey. IEEE Communications Surveys & Tutorials 22:2009\u20132030. https:\/\/doi.org\/10.1109\/COMST.2020.2989392","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1232_CR6","doi-asserted-by":"publisher","first-page":"24617","DOI":"10.1109\/ACCESS.2017.2766090","volume":"5","author":"F Al-Turjman","year":"2017","unstructured":"Al-Turjman F, Ever YK, Ever E, Nguyen HX, David DB (2017) Seamless key agreement framework for mobile-sink in IoT based cloudcentric secured public safety sensor networks. IEEE Access 5:24617\u201324631. https:\/\/doi.org\/10.1109\/ACCESS.2017.2766090","journal-title":"IEEE Access"},{"issue":"4","key":"1232_CR7","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MWC.2016.1600073WC","volume":"24","author":"D He","year":"2016","unstructured":"He D, Chan S, Guizani M (2016) Communication security of unmanned aerial vehicles. IEEE Wireless Commun 24(4):134\u2013139. https:\/\/doi.org\/10.1109\/MWC.2016.1600073WC","journal-title":"IEEE Wireless Commun"},{"issue":"5","key":"1232_CR8","doi-asserted-by":"publisher","first-page":"5391","DOI":"10.1109\/TVT.2020.2977036","volume":"69","author":"V Hassija","year":"2020","unstructured":"Hassija V, Chamola V, Krishna DNG, Guizani M (2020) A distributed framework for energy trading between UAVs and charging stations for critical applications. IEEE Trans Veh Technol 69(5):5391\u20135402. https:\/\/doi.org\/10.1109\/TVT.2020.2977036","journal-title":"IEEE Trans Veh Technol"},{"key":"1232_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.comcom.2019.09.021","volume":"149","author":"V Hassija","year":"2020","unstructured":"Hassija V, Saxena V, Chamola V (2020) Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory. Comput Commun 149:51\u201361. https:\/\/doi.org\/10.1016\/j.comcom.2019.09.021","journal-title":"Comput Commun"},{"issue":"1","key":"1232_CR10","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCOM.2017.1700390","volume":"56","author":"C Lin","year":"2018","unstructured":"Lin C, He D, Kumar N, Choo K-KR, Vinel A, Huang X (2018) Security and privacy for the Internet of drones: Challenges and solutions. IEEE Commun Mag 56(1):64\u201369. https:\/\/doi.org\/10.1109\/MCOM.2017.1700390","journal-title":"IEEE Commun Mag"},{"key":"1232_CR11","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.comcom.2020.02.067","volume":"154","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, He D, Li L, Chen B (2020) A lightweight authentication and key agreement scheme for Internet of drones. Comput Commun 154:455\u2013464. https:\/\/doi.org\/10.1016\/j.comcom.2020.02.067","journal-title":"Comput Commun"},{"issue":"7","key":"1232_CR12","doi-asserted-by":"publisher","first-page":"6903","DOI":"10.1109\/TVT.2019.2911672","volume":"68","author":"J Srinivas","year":"2019","unstructured":"Srinivas J, Das AK, Kumar N, Rodrigues JJ (2019) Tcalas: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment. IEEE Trans Veh Technol 68(7):6903\u20136916. https:\/\/doi.org\/10.1109\/TVT.2019.2911672","journal-title":"IEEE Trans Veh Technol"},{"key":"1232_CR13","doi-asserted-by":"publisher","first-page":"107993","DOI":"10.1109\/ACCESS.2020.3000716","volume":"8","author":"Z Ali","year":"2020","unstructured":"Ali Z, Hussain S, Rehman RHU, Munshi A, Liaqat M, Kumar N, Chaudhry SA (2020) Itssaka-ms: An improved three-factor symmetrickey based secure aka scheme for multi-server environments. IEEE Access 8:107993\u2013108003. https:\/\/doi.org\/10.1109\/ACCESS.2020.3000716","journal-title":"IEEE Access"},{"issue":"5","key":"1232_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/CC.2018.8387987","volume":"15","author":"L Chen","year":"2018","unstructured":"Chen L, Qian S, Lim M, Wang S (2018) An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems. China Commun 15(5):61\u201376. https:\/\/doi.org\/10.1109\/CC.2018.8387987","journal-title":"China Commun"},{"key":"1232_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/INFO10020043","author":"MZ Abdallah","year":"2019","unstructured":"Abdallah MZ, Ali J. Mi\u0161i\u0107, Mi\u0161i\u0107 VBJ (2019) Efficient security scheme for disaster surveillance UAV communication networks. Information. https:\/\/doi.org\/10.3390\/INFO10020043","journal-title":"Information"},{"key":"1232_CR16","doi-asserted-by":"publisher","unstructured":"Semal K, Markantonakis and Akram RN (2018) A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. In: Proc. IEEE\/AIAA 37th Digital Avionics Syst. Conf., pp. 1-8. https:\/\/doi.org\/10.1109\/DASC.2018.8569730","DOI":"10.1109\/DASC.2018.8569730"},{"key":"1232_CR17","doi-asserted-by":"publisher","unstructured":"A Y B S , A A O , B D Z , et al (2013) Trust management system design for the Internet of Things: A context-aware and multi-service approach[J]. Comput Secur 39(1):351-365. https:\/\/doi.org\/10.1016\/j.cose.2013.09.001","DOI":"10.1016\/j.cose.2013.09.001"},{"key":"1232_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-022-01330-7","author":"X Du","year":"2022","unstructured":"Du X, Li Y, Zhou S et al (2022) ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks. Peer-to-Peer Netw Appl. https:\/\/doi.org\/10.1007\/s12083-022-01330-7","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1232_CR19","doi-asserted-by":"publisher","unstructured":"P. J. Werbos (2019) The new ai: Basic concepts, and urgent risks and opportunities in the internet of things,\u201d in Artificial Intelligence in the Age of NeuralNetworks and Brain Computing. Elsevier, pp. 161-190. https:\/\/doi.org\/10.1016\/B978-0-12-815480-9.00008-6","DOI":"10.1016\/B978-0-12-815480-9.00008-6"},{"key":"1232_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2880838","author":"U Din","year":"2018","unstructured":"Din U, Guizani M, Kim B-S, Hassan S, Khan MK (2018) Trust management techniques for the internet of things: a survey. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2018.2880838","journal-title":"IEEE Access"},{"issue":"2","key":"1232_CR21","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","volume":"4","author":"R Sfar","year":"2018","unstructured":"Sfar R, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the internet of things. Digital Commun Netw 4(2):118\u2013137. https:\/\/doi.org\/10.1016\/j.dcan.2017.04.003","journal-title":"Digital Commun Netw"},{"key":"1232_CR22","doi-asserted-by":"publisher","unstructured":"Bao, F, Chen I-R (2012) Dynamic trust management for internet of things applications. In: Proceedings of the 2012 international workshop on Selfaware internet of things. ACM. https:\/\/doi.org\/10.1145\/2378023.2378025","DOI":"10.1145\/2378023.2378025"},{"issue":"5","key":"1232_CR23","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TKDE.2013.105","volume":"26","author":"M Nitti","year":"2014","unstructured":"Nitti M, Girau R, Atzori L (2014) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26(5):1253\u20131266. https:\/\/doi.org\/10.1109\/TKDE.2013.105","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1232_CR24","doi-asserted-by":"publisher","unstructured":"Mendoza CV, Kleinschmidt JH (2015) Mitigating on-off attacks in the internet of things using a distributed trust management scheme. Int J Distrib Sens Netw 11(11):859731. https:\/\/doi.org\/10.1155\/2015\/859731","DOI":"10.1155\/2015\/859731"},{"key":"1232_CR25","doi-asserted-by":"publisher","unstructured":"Son H, Kang N, Gwak B, Lee D (2017) An adaptive iot trust estimation scheme combining interaction history and stereotypical reputation. In: Consumer Communications & Networking Conference (CCNC), 14th IEEE Annual. IEEE 2017:349\u2013352. https:\/\/doi.org\/10.1109\/CCNC.2017.7983132","DOI":"10.1109\/CCNC.2017.7983132"},{"key":"1232_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102249","author":"L Zhang","year":"2021","unstructured":"Zhang L, Zou Y, Wang W et al (2021) Resource allocation and trust computing for blockchain-enabled edge computing system - ScienceDirect[J]. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2021.102249","journal-title":"Comput Secur"},{"key":"1232_CR27","doi-asserted-by":"publisher","unstructured":"Semal B, Markantonakis K, Akram RNA, certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks[C]. (2018) IEEE\/AIAA 37th Digital Avionics Systems Conference (DASC). IEEE 2018:1\u20138. https:\/\/doi.org\/10.1109\/DASC.2018.8569730","DOI":"10.1109\/DASC.2018.8569730"},{"key":"1232_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3142251","author":"Y Tan","year":"2022","unstructured":"Tan Y, Wang J, Liu J et al (2022) Blockchain-Assisted Distributed and Lightweight Authentication Service for Industrial Unmanned Aerial Vehicles[J]. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2022.3142251","journal-title":"IEEE Internet Things J"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01232-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01232-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01232-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T15:15:47Z","timestamp":1711811747000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01232-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,30]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["1232"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01232-y","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,30]]},"assertion":[{"value":"1 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}