{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T12:02:11Z","timestamp":1775563331373,"version":"3.50.1"},"reference-count":12,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:00:00Z","timestamp":1772496000000},"content-version":"vor","delay-in-days":61,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.03.008","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T12:39:40Z","timestamp":1774355980000},"page":"417-424","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Drone Authentication System Using Radio Frequency Fingerprinting"],"prefix":"10.1016","volume":"278","author":[{"given":"Jamila Muhsen","family":"Alnuaimi","sequence":"first","affiliation":[]},{"given":"Shamma Ghaleb","family":"Almansoori","sequence":"additional","affiliation":[]},{"given":"Noura Ahmed","family":"Alrumeithi","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Ikuesan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.procs.2026.03.008_bib1","first-page":"1673","article-title":"\u201cMachine learning for wireless communications in the Internet of Things: A comprehensive survey,\u201d","volume":"22","author":"Lichtman","year":"2020","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"10.1016\/j.procs.2026.03.008_bib2","first-page":"623","article-title":"\u201cExploiting the physical layer for enhanced security in wireless networks: A survey,\u201d","volume":"17","author":"D\u2019Oro","year":"2015","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10.1016\/j.procs.2026.03.008_bib3","first-page":"6110","article-title":"\u201cRadio frequency fingerprinting for intrusion detection in low-cost wireless networks,\u201d","volume":"6","author":"Rehman","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.03.008_bib4","first-page":"195","article-title":"\u201cPhysical layer security in wireless communications: A comprehensive survey,\u201d","volume":"8","author":"Hoang","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.03.008_bib5","first-page":"1","article-title":"\u201cRF fingerprinting for low-cost wireless sensor networks,\u201d in Proc. 2010 IEEE Int. Conf. Wireless Commun. Netw. Inf. Security (WCNIS)","author":"Lightfoot","year":"2010","journal-title":"Beijing, China"},{"key":"10.1016\/j.procs.2026.03.008_bib6","unstructured":"T. E. Humphreys, \u201cStatement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing,\u201d Radionavigation Laboratory, University of Texas at Austin, 2012. [Online]. Available: https:\/\/radionavlab.ae.utexas.edu\/images\/stories\/files\/papers\/humphreys_gps_spoofing_testimony.pdf"},{"key":"10.1016\/j.procs.2026.03.008_bib7","unstructured":"Kaspersky, \u201cKaspersky Security Bulletin: Overall Statistics for 2020,\u201d 2020. [Online]. Available: https:\/\/securelist.com\/kaspersky-security-bulletin-2020-statistics\/99999\/"},{"issue":"1","key":"10.1016\/j.procs.2026.03.008_bib8","first-page":"1","article-title":"\u201cA survey of data leakage detection and prevention solutions,\u201d","volume":"7","author":"Shabtai","year":"2021","journal-title":"Computer Virology and Hacking Techniques"},{"key":"10.1016\/j.procs.2026.03.008_bib9","unstructured":"Ministry of Interior UAE, \u201cUAE lifts conditional ban on individual drone use,\u201d Gulf News, Jan. 7, 2025. [Online]. Available: https:\/\/gulfnews.com\/uae\/government\/uae-lifts-conditional-ban-on-individual-drone-use-1.500012183"},{"key":"10.1016\/j.procs.2026.03.008_bib10","series-title":"Entropy-based RF fingerprinting for drone detection and identification","author":"Zhao","year":"2022"},{"issue":"4","key":"10.1016\/j.procs.2026.03.008_bib11","first-page":"2301","article-title":"RF fingerprint extraction for UAV identification using deep spectral features","volume":"22","author":"Li","year":"2023","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"10.1016\/j.procs.2026.03.008_bib12","series-title":"RF fingerprinting for drone authentication in non-cooperative environments","author":"Mazzo","year":"2023"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926006009?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926006009?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:16:48Z","timestamp":1775560608000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926006009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":12,"alternative-id":["S1877050926006009"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.008","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Drone Authentication System Using Radio Frequency Fingerprinting","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.008","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}