{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T05:47:27Z","timestamp":1776577647691,"version":"3.51.2"},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62441214"],"award-info":[{"award-number":["62441214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72441009"],"award-info":[{"award-number":["72441009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62462065"],"award-info":[{"award-number":["62462065"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.comnet.2026.112243","type":"journal-article","created":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T00:46:12Z","timestamp":1774658772000},"page":"112243","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["TEBP-UAVs: A trusted and efficient blockchain-based protocol for cross-domain authentication in UAVs"],"prefix":"10.1016","volume":"282","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7804-3535","authenticated-orcid":false,"given":"Libo","family":"Feng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chengyuan","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mengzhuang","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Feng","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2839-8869","authenticated-orcid":false,"given":"Yimin","family":"Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2026.112243_bib0001","first-page":"1","article-title":"Cooperative reinforcement learning for military drones over large-Scale battlefields","author":"Kim","year":"2024","journal-title":"IEEE Trans. Intell. Veh."},{"issue":"1","key":"10.1016\/j.comnet.2026.112243_bib0002","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/TETCI.2024.3406689","article-title":"Transfer optimization for heterogeneous drone delivery and pickup problem","volume":"9","author":"Wen","year":"2025","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"10.1016\/j.comnet.2026.112243_bib0003","first-page":"1","article-title":"Reinforcement learning-Based low-Delay data collection in UAV-Assisted IoT for secondary geological hazard monitoring","author":"Fu","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2026.112243_bib0004","first-page":"1","article-title":"Multi-Objective multi-Drone collaborative routing problem with heterogeneous delivery and pickup service","author":"Hong","year":"2025","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.comnet.2026.112243_bib0005","unstructured":"European Commission, Commission Implementing Regulation (EU) 2021\/664 of 22 April 2021 on a regulatory framework for the U-space, 2021, (Official Journal of the European Union). OJ L 139, 23 April 2021, pp. 161\u2013183, https:\/\/eur-lex.europa.eu\/eli\/reg_impl\/2021\/664\/oj\/eng."},{"key":"10.1016\/j.comnet.2026.112243_bib0006","unstructured":"Federal Aviation Administration, Remote Identification of Unmanned Aircraft, 2021, (Federal Register, Vol. 86, 86 FR 4390\u20134513). Document No. 2020\u201328948, https:\/\/www.federalregister.gov\/documents\/2021\/01\/15\/2020-28948\/remote-identification-of-unmanned-aircraft."},{"key":"10.1016\/j.comnet.2026.112243_bib0007","unstructured":"International Civil Aviation Organization, Unmanned Aircraft Systems Traffic Management (UTM) \u2013 A Common Framework with Core Principles for Global Harmonization, Guidance material Edition 4, International Civil Aviation Organization (ICAO), 2023. https:\/\/www.icao.int\/sites\/default\/files\/left-menu-pdfs\/UTM%20Framework%20Edition%204.pdf."},{"issue":"5","key":"10.1016\/j.comnet.2026.112243_bib0008","doi-asserted-by":"crossref","first-page":"6588","DOI":"10.1109\/TII.2022.3201971","article-title":"An improved lightweight two-Factor authentication protocol for IoT applications","volume":"19","author":"Modarres","year":"2023","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.comnet.2026.112243_bib0009","doi-asserted-by":"crossref","first-page":"4448","DOI":"10.1109\/TIFS.2024.3379861","article-title":"Provably and physically secure UAV - Assisted authentication protocol for IoT devices in unattended settings","volume":"19","author":"Tian","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112243_bib0010","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/TIFS.2024.3523198","article-title":"Efficient revocable cross-Domain anonymous authentication scheme for IIot","volume":"20","author":"Zeng","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112243_bib0011","first-page":"1","article-title":"Blockchain-Assisted revocable cross-Domain authentication for vehicular ad-Hoc networks","author":"Li","year":"2025","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.comnet.2026.112243_bib0012","doi-asserted-by":"crossref","first-page":"3789","DOI":"10.1109\/TIFS.2022.3214733","article-title":"CCAP: A complete cross-Domain authentication based on blockchain for internet of things","volume":"17","author":"Tong","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112243_bib0013","series-title":"2022 IEEE 8Th International Conference on Computer and Communications","first-page":"731","article-title":"A lightweight key agreement scheme for UAV network","author":"Liu","year":"2022"},{"issue":"8","key":"10.1016\/j.comnet.2026.112243_bib0014","doi-asserted-by":"crossref","first-page":"10286","DOI":"10.1109\/TITS.2024.3360251","article-title":"A UAV-Assisted authentication protocol for internet of vehicles","volume":"25","author":"Miao","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"12","key":"10.1016\/j.comnet.2026.112243_bib0015","doi-asserted-by":"crossref","first-page":"21697","DOI":"10.1109\/TITS.2024.3480029","article-title":"RLBA-UAV: A robust and lightweight blockchain-Based authentication and key agreement scheme for PUF-Enabled UAVs","volume":"25","author":"Yu","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"10.1016\/j.comnet.2026.112243_bib0016","doi-asserted-by":"crossref","first-page":"1339","DOI":"10.1109\/JIOT.2021.3084946","article-title":"RAMP-IoD: a robust authenticated key management protocol for the internet of drones","volume":"9","author":"Tanveer","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112243_bib0017","doi-asserted-by":"crossref","first-page":"1810","DOI":"10.1109\/TIFS.2020.3044855","article-title":"SMAKA: Secure many-to-Many authentication and key agreement scheme for vehicular networks","volume":"16","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"10.1016\/j.comnet.2026.112243_bib0018","doi-asserted-by":"crossref","first-page":"5849","DOI":"10.1109\/TVT.2023.3335839","article-title":"LiteGAP: lightweight group authentication protocol for internet of drones systems","volume":"73","author":"Pu","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"7","key":"10.1016\/j.comnet.2026.112243_bib0019","doi-asserted-by":"crossref","first-page":"4118","DOI":"10.1109\/TITS.2020.3015862","article-title":"Blockchain-Enabled trustworthy group communications in UAV networks","volume":"22","author":"Gai","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.comnet.2026.112243_bib0020","series-title":"2023 IEEE\/CIC International Conference on Communications in China","first-page":"1","article-title":"Blockchain-assisted cross-Domain authentication and access control for low-altitude UAV","author":"Pan","year":"2023"},{"issue":"6","key":"10.1016\/j.comnet.2026.112243_bib0021","doi-asserted-by":"crossref","first-page":"5267","DOI":"10.1109\/TNSE.2023.3324639","article-title":"Blockchain-Aided secure access control for UAV computing networks","volume":"11","author":"Wang","year":"2024","journal-title":"IEEE Trans. Network Sci. Eng."},{"issue":"23","key":"10.1016\/j.comnet.2026.112243_bib0022","doi-asserted-by":"crossref","first-page":"20586","DOI":"10.1109\/JIOT.2023.3293755","article-title":"Location privacy protection for UAVs in package delivery and IoT data collection","volume":"10","author":"Enayati","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"10.1016\/j.comnet.2026.112243_bib0023","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1145\/3645087","article-title":"An all-Inclusive taxonomy and critical review of blockchain-Assisted authentication and session key generation protocols for IoT","volume":"56","author":"Shahidinejad","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.comnet.2026.112243_bib0024","doi-asserted-by":"crossref","first-page":"9055","DOI":"10.1109\/TIFS.2024.3465847","article-title":"BASUV: A blockchain-Enabled UAV authentication scheme for internet of vehicles","volume":"19","author":"Xie","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"10.1016\/j.comnet.2026.112243_bib0025","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/TVT.2023.3306813","article-title":"SAAF-IoD: secure and anonymous authentication framework for the internet of drones","volume":"73","author":"Tanveer","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2026.112243_bib0026","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111492","article-title":"EUAV: An enhanced blockchain-based two-factor anonymous authentication key agreement protocol for UAV networks","volume":"270","author":"Liu","year":"2025","journal-title":"Comput. Netw."},{"issue":"13","key":"10.1016\/j.comnet.2026.112243_bib0027","doi-asserted-by":"crossref","first-page":"24185","DOI":"10.1109\/JIOT.2025.3554573","article-title":"A verifiable transaction selection method for DAG blockchain with VRF","volume":"12","author":"Feng","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112243_bib0028","series-title":"2018 IEEE\/AIAA 37Th Digital Avionics Systems Conference","first-page":"1","article-title":"A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks","author":"Semal","year":"2018"},{"issue":"2","key":"10.1016\/j.comnet.2026.112243_bib0029","doi-asserted-by":"crossref","first-page":"3253","DOI":"10.1109\/TVT.2024.3476670","article-title":"Blockchain-Assisted efficient data sharing scheme with accountability and privacy-Preserving for internet of drones networks","volume":"74","author":"Zhou","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"10.1016\/j.comnet.2026.112243_bib0030","doi-asserted-by":"crossref","first-page":"9547","DOI":"10.1109\/JIOT.2023.3324543","article-title":"Lightweight blockchain-Enhanced mutual authentication protocol for UAVs","volume":"11","author":"Wang","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112243_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.108804","article-title":"SETCAP: Service-Based energy-Efficient temporal credential authentication protocol for internet of drones","volume":"206","author":"El-Zawawy","year":"2022","journal-title":"Comput. Netw."},{"issue":"11","key":"10.1016\/j.comnet.2026.112243_bib0032","doi-asserted-by":"crossref","first-page":"19790","DOI":"10.1109\/JIOT.2024.3367799","article-title":"A lightweight and anonymous application-aware authentication and key agreement protocol for the internet of drones","volume":"11","author":"Bhattarai","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112243_bib0033","first-page":"1","article-title":"SEPP-FLBC: A secure and efficient privacy protection scheme using federate learning and blockchain for edge-End-Cloud devices","author":"Feng","year":"2025","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.comnet.2026.112243_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103785","article-title":"Observational equivalence and security games: enhancing the formal analysis of security protocols","volume":"140","author":"Cai","year":"2024","journal-title":"Comput. Secur."},{"issue":"12","key":"10.1016\/j.comnet.2026.112243_bib0035","doi-asserted-by":"crossref","first-page":"9918","DOI":"10.1109\/JIOT.2022.3163367","article-title":"A lightweight and privacy-Preserving mutual authentication and key agreement protocol for internet of drones environment","volume":"9","author":"Pu","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.comnet.2026.112243_bib0036","doi-asserted-by":"crossref","first-page":"6224","DOI":"10.1109\/JIOT.2021.3113321","article-title":"Blockchain-Based cross-Domain authentication for intelligent 5G-Enabled internet of drones","volume":"9","author":"Feng","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"18","key":"10.1016\/j.comnet.2026.112243_bib0037","doi-asserted-by":"crossref","first-page":"16928","DOI":"10.1109\/JIOT.2022.3142251","article-title":"Blockchain-Assisted distributed and lightweight authentication service for industrial unmanned aerial vehicles","volume":"9","author":"Tan","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112243_bib0038","series-title":"2024 IEEE 21St Consumer Communications & Networking Conference","first-page":"931","article-title":"Chebyshev polynomial and private blockchain based cross-Domain authentication protocol for IoD networks","author":"Pu","year":"2024"},{"issue":"5","key":"10.1016\/j.comnet.2026.112243_bib0039","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","article-title":"Blockchain-Assisted secure device authentication for cross-Domain industrial IoT","volume":"38","author":"Shen","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"10","key":"10.1016\/j.comnet.2026.112243_bib0040","doi-asserted-by":"crossref","first-page":"7059","DOI":"10.1109\/TII.2021.3084753","article-title":"Blockchain-Based reliable and efficient certificateless signature for IIot devices","volume":"18","author":"Wang","year":"2022","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"5","key":"10.1016\/j.comnet.2026.112243_bib0041","doi-asserted-by":"crossref","first-page":"302","DOI":"10.3390\/drones7050302","article-title":"BCDAIoD: an efficient blockchain-Based cross-Domain authentication scheme for internet of drones","volume":"7","author":"Qiao","year":"2023","journal-title":"Drones"},{"key":"10.1016\/j.comnet.2026.112243_bib0042","doi-asserted-by":"crossref","first-page":"58800","DOI":"10.1109\/ACCESS.2020.2982542","article-title":"XDBAuth: blockchain based cross domain authentication and authorization framework for internet of things","volume":"8","author":"Ali","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112243_bib0043","doi-asserted-by":"crossref","first-page":"9344","DOI":"10.1109\/TIFS.2024.3468624","article-title":"Biometrics-Based authenticated key exchange with multi-Factor fuzzy extractor","volume":"19","author":"Tran","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.comnet.2026.112243_bib0044","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/TNSE.2022.3142287","article-title":"Design of blockchain-Based lightweight V2I handover authentication protocol for VANET","volume":"9","author":"Son","year":"2022","journal-title":"IEEE Trans. Network Sci. Eng."},{"issue":"2","key":"10.1016\/j.comnet.2026.112243_bib0045","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"10.1016\/j.comnet.2026.112243_bib0046","doi-asserted-by":"crossref","first-page":"3572","DOI":"10.1109\/JIOT.2018.2888821","article-title":"Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment","volume":"6","author":"Wazid","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"10.1016\/j.comnet.2026.112243_bib0047","doi-asserted-by":"crossref","first-page":"6903","DOI":"10.1109\/TVT.2019.2911672","article-title":"TCALAS: Temporal credential-Based anonymous lightweight authentication scheme for internet of drones environment","volume":"68","author":"Srinivas","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2026.112243_bib0048","doi-asserted-by":"crossref","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","article-title":"Secure signature-Based authenticated key establishment scheme for future IoT applications","volume":"5","author":"Challa","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112243_bib0049","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108219","article-title":"A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment","volume":"195","author":"Irshad","year":"2021","journal-title":"Comput. Netw."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626002550?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626002550?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T05:20:57Z","timestamp":1776576057000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128626002550"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":49,"alternative-id":["S1389128626002550"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112243","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"TEBP-UAVs: A trusted and efficient blockchain-based protocol for cross-domain authentication in UAVs","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112243","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112243"}}