{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:44:22Z","timestamp":1778150662414,"version":"3.51.4"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3395494","type":"journal-article","created":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T19:50:31Z","timestamp":1714506631000},"page":"62750-62764","source":"Crossref","is-referenced-by-count":7,"title":["An Efficient Authentication and Access Control Protocol for Securing UAV Networks Against Anomaly-Based Intrusion"],"prefix":"10.1109","volume":"12","author":[{"given":"Khaista","family":"Rahman","sequence":"first","affiliation":[{"name":"Department of Electronic Engineering, School of Engineering and Applied Sciences, Isra University, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1351-898X","authenticated-orcid":false,"given":"Muhammad Asghar","family":"Khan","sequence":"additional","affiliation":[{"name":"Faculty of Engineering Sciences and Technology, Hamdard University, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2315-1173","authenticated-orcid":false,"given":"Fatemeh","family":"Afghah","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4016-4830","authenticated-orcid":false,"given":"Gordana","family":"Barb","sequence":"additional","affiliation":[{"name":"Department of Communications, Politehnica University of Timisoara, Timisoara, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4412-7727","authenticated-orcid":false,"given":"Nisreen","family":"Innab","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Systems, College of Applied Sciences, Almaarefa University, Riyadh, Saudi Arabia"}]},{"given":"Tanveer","family":"Ahmed Cheema","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, School of Engineering and Applied Sciences, Isra University, Islamabad, Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/drones6060147"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s21186223"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14358\/PERS.81.4.281"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3213370"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600073WC"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/drones6010010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/rs14194826"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3246766"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR.2017.8088163"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2022.110894"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.2000017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.067"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3123142"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4275243"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE.2014.7086640"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080659"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.58496\/MJBD\/2021\/003"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_11"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CCiCT56684.2022.00106"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2911672"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10121417"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977817"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.06.010"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101955"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102670"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.011"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107999"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/app10093149"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2985719"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0627-8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2023.3276066"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3000576"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.12.005"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC47284.2019.8969732"},{"key":"ref36","volume-title":"Automated Validation of Internet Security Protocols and Applications","year":"2019"},{"key":"ref37","volume-title":"SPAN: A Security Protocol Animator for AVISPA","year":"2019"},{"key":"ref38","first-page":"1","article-title":"The high-level protocol specification language HLPSL developed in the EU project AVISPA","volume-title":"Proc. APPSEM Workshop","author":"Oheimb"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0055-7"},{"key":"ref40","first-page":"227","article-title":"The CL-Atse porotocol analyser","volume-title":"Proc. Int. Conf. Rewriting Techn. Appl. (RTA)","author":"Turuani"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/s18103191"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2773535"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2777840"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.009"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844190"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2827027"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3057047"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103477"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/s23125419"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/drones6100264"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10510437.pdf?arnumber=10510437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T17:42:24Z","timestamp":1715190144000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10510437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3395494","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}