{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:05:20Z","timestamp":1770336320876,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T00:00:00Z","timestamp":1652400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 110-2221-E-320-005-MY2"],"award-info":[{"award-number":["MOST 110-2221-E-320-005-MY2"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,13]]},"DOI":"10.1145\/3545729.3545784","type":"proceedings-article","created":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T16:13:55Z","timestamp":1665677635000},"page":"271-275","source":"Crossref","is-referenced-by-count":4,"title":["Security Analysis of Authentication and Key Agreement for Internet of Drones"],"prefix":"10.1145","author":[{"given":"TIAN-FU","family":"LEE","sequence":"first","affiliation":[{"name":"Department of Medical Informatics, TZU Chi University, Taiwan"}]},{"given":"WEI-JIE","family":"HUANG","sequence":"additional","affiliation":[{"name":"Department of Medical Informatics, TZU Chi University, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2022,10,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Privacy protection for Internet of Drones: A network coding approach","author":"Chen Y.-J.","year":"2019","unstructured":"Chen Y.-J. , Wang L.-C. 2019. Privacy protection for Internet of Drones: A network coding approach , IEEE Internet Things J. 6 (2) ( 2019 ) 1719\u20131730, http:\/\/dx. doi.org\/10.1109\/JIOT.2018.2875065. Chen Y.-J., Wang L.-C. 2019. Privacy protection for Internet of Drones: A network coding approach, IEEE Internet Things J. 6 (2) (2019) 1719\u20131730, http:\/\/dx. doi.org\/10.1109\/JIOT.2018.2875065."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.10.014"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Valentino R. Jung W.-S. Ko Y.-B. 2018. A design and simulation of the opportunistic computation offloading with learning-based prediction for unmanned aerial vehicle (UAV) clustering networks Sensors 18 (11) (2018) 3751.  Valentino R. Jung W.-S. Ko Y.-B. 2018. A design and simulation of the opportunistic computation offloading with learning-based prediction for unmanned aerial vehicle (UAV) clustering networks Sensors 18 (11) (2018) 3751.","DOI":"10.3390\/s18113751"},{"key":"e_1_3_2_1_4_1","volume-title":"Natalizio E 2018","author":"Erdelj M.","year":"2018","unstructured":"Erdelj M. , Uk B. , Konam D. , Natalizio E 2018 ., From the eye of the storm: An IoT ecosystem made of sensors, smartphones and UAVs, Sensors 18 (11 ) ( 2018 ) 3814. Erdelj M., Uk B., Konam D., Natalizio E 2018., From the eye of the storm: An IoT ecosystem made of sensors, smartphones and UAVs, Sensors 18 (11) (2018) 3814."},{"key":"e_1_3_2_1_5_1","first-page":"45","volume-title":"The Future of Drone Use","author":"Vergouw B.","year":"2016","unstructured":"Vergouw B. , Nagel H. , Bondt G. , Custers B 2016. , Drone technology: Types, payloads, applications, frequency spectrum issues and future developments , in: The Future of Drone Use , Springer , 2016 , pp. 21\u2013 45 , http:\/\/dx.doi.org\/10.1007\/978-94-6265-132-6_2. Vergouw B., Nagel H., Bondt G., Custers B 2016., Drone technology: Types, payloads, applications, frequency spectrum issues and future developments, in: The Future of Drone Use, Springer, 2016, pp. 21\u201345, http:\/\/dx.doi.org\/10.1007\/978-94-6265-132-6_2."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.003"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Kumar N. Chilamkurti N. Rodrigues J.J.P.C 2014. Learning automata-based opportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks 39 (3) (2014) 22\u201332.  Kumar N. Chilamkurti N. Rodrigues J.J.P.C 2014. Learning automata-based opportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks 39 (3) (2014) 22\u201332.","DOI":"10.1016\/j.comcom.2013.09.005"},{"key":"e_1_3_2_1_8_1","volume-title":"Kim H 2019","author":"Bae M.","year":"2019","unstructured":"Bae M. , Kim H 2019 ., Authentication and delegation for operating a multi-drone system, Sensors 19 (9 ) ( 2019 ) 2066. Bae M., Kim H 2019., Authentication and delegation for operating a multi-drone system, Sensors 19 (9) (2019) 2066."},{"key":"e_1_3_2_1_9_1","volume-title":"Batra S","author":"Kaur R.","year":"2019","unstructured":"Kaur R. , Kumar N. , Batra S 2019 ., Trust management in social Internet of Things : A taxonomy, open issues, and challenges, Comput. Commun. 150 (2019), http:\/\/dx.doi.org\/10.1016\/j.comcom.2019.10.034. Kaur R., Kumar N., Batra S 2019., Trust management in social Internet of Things: A taxonomy, open issues, and challenges, Comput. Commun. 150 (2019), http:\/\/dx.doi.org\/10.1016\/j.comcom.2019.10.034."},{"key":"e_1_3_2_1_10_1","volume-title":"Li L 2020","author":"Zhang Y.","year":"2020","unstructured":"Zhang Y. , He D. , Li L 2020 ., B. Chen, A lightweight authentication and key agreement scheme for Internet of Drones Computer Communications, 154 (15 ) ( 2020 ) 455-464, https:\/\/doi.org\/10.1016\/j.comcom.2020.02.067 Zhang Y., He D., Li L 2020., B. Chen, A lightweight authentication and key agreement scheme for Internet of Drones Computer Communications, 154 (15) (2020) 455-464, https:\/\/doi.org\/10.1016\/j.comcom.2020.02.067"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Li C.T. Lee C.C 2014. C.Y. Weng A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems J. Med. Syst. 38 (9) (2014) 77.  Li C.T. Lee C.C 2014. C.Y. Weng A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems J. Med. Syst. 38 (9) (2014) 77.","DOI":"10.1007\/s10916-014-0077-2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Lee C.C. Lai Y.M. Chen C.T. Chen S.D 2016. Advanced secure anonymous authentication scheme for roaming service in global mobility networks Wirel. Pers. Commun. 94 (3) (2016) 1\u201316.  Lee C.C. Lai Y.M. Chen C.T. Chen S.D 2016. Advanced secure anonymous authentication scheme for roaming service in global mobility networks Wirel. Pers. Commun. 94 (3) (2016) 1\u201316.","DOI":"10.1007\/s11277-016-3682-1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1016\/j.future.2016.11.024","article-title":"Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks","volume":"78","author":"Vijayakumar P.","year":"2016","unstructured":"Vijayakumar P. , Chang V. , Deborah L.J. , Balusamy B. , Shynuc P.G 2016 ., Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks , Future Gener. Comput. Syst. 78 (2016) 943 \u2013 955 . Vijayakumar P., Chang V., Deborah L.J.,Balusamy B., Shynuc P.G 2016., Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks, Future Gener. Comput. Syst. 78 (2016) 943\u2013955.","journal-title":"Future Gener. Comput. Syst."},{"key":"e_1_3_2_1_14_1","volume-title":"Chang V 2017","author":"Amin R.","year":"2017","unstructured":"Amin R. , Islam S.H. , Vijayakumar P. , Khan M.K. , Chang V 2017 ., A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication, Multimedia Tools Appl. 77 (13 ) ( 2017 ) 1\u201326. Amin R., Islam S.H., Vijayakumar P., Khan M.K., Chang V 2017., A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication, Multimedia Tools Appl. 77 (13) (2017) 1\u201326."},{"key":"e_1_3_2_1_15_1","volume-title":"Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography","author":"He D.","year":"2018","unstructured":"He D. , Zhang Y. , Wang D. , Choo K.-K. R 2018. , Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography , IEEE Trans. Dependable Secure Comput . 1 (99) ( 2018 ) 1\u201310, http:\/\/dx.doi.org\/10.1109\/TDSC.2018.2857775. He D., Zhang Y., Wang D., Choo K.-K.R 2018., Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography, IEEE Trans. Dependable Secure Comput. 1 (99) (2018) 1\u201310, http:\/\/dx.doi.org\/10.1109\/TDSC.2018.2857775."},{"key":"e_1_3_2_1_16_1","volume-title":"Liang K 2018","author":"Feng Q.","year":"2018","unstructured":"Feng Q. , He D. , Zeadally S. , Kumar N. , Liang K 2018 ., Ideal lattice-based anonymous authentication protocol for mobile devices, IEEE Syst. J. 13 (3 ) ( 2018 ) 2775\u20132785, http:\/\/dx.doi.org\/10.1109\/JSYST.2018.2851295. Feng Q., He D., Zeadally S., Kumar N., Liang K 2018., Ideal lattice-based anonymous authentication protocol for mobile devices, IEEE Syst. J. 13 (3) (2018) 2775\u20132785, http:\/\/dx.doi.org\/10.1109\/JSYST.2018.2851295."},{"key":"e_1_3_2_1_17_1","volume-title":"Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of Drones deployment","author":"Wazid M.","year":"2019","unstructured":"Wazid M. , Das A.K. Kumar , N. , Vasilakos A.V. , Rodrigues J.J.P. C 2019. , Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of Drones deployment , IEEE Internet Things J. 6 (2) ( 2019 ) 3572\u20133584, http:\/\/dx.doi.org\/10.1109\/JIOT.2018.2888821. Wazid M., Das A.K. Kumar, N., Vasilakos A.V., Rodrigues J.J.P.C 2019., Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of Drones deployment, IEEE Internet Things J. 6 (2) (2019) 3572\u20133584, http:\/\/dx.doi.org\/10.1109\/JIOT.2018.2888821."},{"key":"e_1_3_2_1_18_1","volume-title":"Venkatesan S 2019","author":"Singh J.","year":"2019","unstructured":"Singh J. , Gimekar A. , Venkatesan S 2019 ., An efficient lightweight authentication scheme for human-centered industrial Internet of Things, Int. J. Commun. Syst. ( 2019 ) e4189, http:\/\/dx.doi.org\/10.1002\/dac.4189. Singh J., Gimekar A., Venkatesan S 2019., An efficient lightweight authentication scheme for human-centered industrial Internet of Things, Int. J. Commun. Syst. (2019) e4189, http:\/\/dx.doi.org\/10.1002\/dac.4189."}],"event":{"name":"ICMHI 2022: 2022 6th International Conference on Medical and Health Informatics","location":"Virtual Event Japan","acronym":"ICMHI 2022"},"container-title":["2022 6th International Conference on Medical and Health Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545729.3545784","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545729.3545784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:46Z","timestamp":1750186966000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545729.3545784"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,13]]},"references-count":18,"alternative-id":["10.1145\/3545729.3545784","10.1145\/3545729"],"URL":"https:\/\/doi.org\/10.1145\/3545729.3545784","relation":{},"subject":[],"published":{"date-parts":[[2022,5,13]]}}}