{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:17:51Z","timestamp":1777889871773,"version":"3.51.4"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Qatar National Library, Doha, Qatar"},{"DOI":"10.13039\/501100004252","name":"Qatar University (QU) Internal Grant","doi-asserted-by":"publisher","award":["IRCC-2021-010"],"award-info":[{"award-number":["IRCC-2021-010"]}],"id":[{"id":"10.13039\/501100004252","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3076692","type":"journal-article","created":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T19:36:40Z","timestamp":1619725000000},"page":"69287-69306","source":"Crossref","is-referenced-by-count":71,"title":["Design and Analysis of Lightweight Authentication Protocol for Securing IoD"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1268-0325","authenticated-orcid":false,"given":"Saeed Ullah","family":"Jan","sequence":"first","affiliation":[]},{"given":"Fawad","family":"Qayum","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8373-2781","authenticated-orcid":false,"given":"Habib Ullah","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.067"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4189"},{"key":"ref33","article-title":"Dronecrypt&#x2014;An efficient cryptographic framework for small aerial drones","author":"ozmen","year":"2019","journal-title":"arXiv 1903 12301"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101955"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.05.025"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN49260.2020.9153239"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2911672"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2888821"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2560343"},{"key":"ref34","first-page":"54","article-title":"A lightweight identity authentication scheme for UAV and road base stations","author":"li","year":"2020","journal-title":"Proc Int Conf Cyberspace Innov Adv Technol"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.03.009"},{"key":"ref27","first-page":"226","article-title":"Privacy preservation and drone authentication using ID-based signcryption","author":"benzarti","year":"2018","journal-title":"Some"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019367"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9707-1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2537208"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2676119"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_26"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11780656_18"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh153"},{"key":"ref26","first-page":"113","article-title":"A new cyber security framework towards secure data communication for unmanned aerial vehicle (UAV)","author":"samsul","year":"2017","journal-title":"Proc Int Conf Secur Privacy Commun Syst"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315280"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2850299"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3057047"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9707-1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977817"},{"key":"ref12","first-page":"198","article-title":"On the security of public key protocols&#x2014;An information theory","volume":"29","author":"dolev","year":"1983","journal-title":"IEEE Trans"},{"key":"ref13","first-page":"171","article-title":"An uninstantiable random-oracle-model protocol for a hybrid-encryption problem","author":"bellare","year":"2004","journal-title":"Proc Int Conf Theory Appl Cryptograph Techn"},{"key":"ref14","first-page":"5","article-title":"ProVerif 2.00: Automatic cryptographic protocol verifier, user manual and tutorial","author":"blanchet","year":"2018","journal-title":"Version"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.091513.00050"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-011-4413-6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.09.032"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E98.A.92"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.021"},{"key":"ref4","first-page":"1127","article-title":"Drones and distinction: How IHL encouraged the rise of drones","volume":"44","author":"lewis","year":"2013","journal-title":"THE Georgetown Law Journal"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31837-5_44"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106877"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1117\/12.2514759"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2889866"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819972-5.00003-3"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107731"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2020.106529"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/app10093149"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/sym10040084"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.279"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2966160"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3036425"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.1069"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2996093"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09418994.pdf?arnumber=9418994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:53Z","timestamp":1639770953000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9418994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3076692","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}