{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T18:10:04Z","timestamp":1755886204315,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["NWA.1162.18.301"],"award-info":[{"award-number":["NWA.1162.18.301"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Otan","award":["MYP G5828"],"award-info":[{"award-number":["MYP G5828"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3627106.3627174","type":"proceedings-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T18:13:22Z","timestamp":1701540802000},"page":"178-189","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3324-3706","authenticated-orcid":false,"given":"Tedeschi","family":"Pietro","sequence":"first","affiliation":[{"name":"Technology Innovation Institute (TII), United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0974-3639","authenticated-orcid":false,"given":"Sciancalepore","family":"Savio","sequence":"additional","affiliation":[{"name":"Technische Universiteit Eindhoven (TU\/e), Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1909-0336","authenticated-orcid":false,"given":"Di Pietro","family":"Roberto","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science and Technology - CEMSE - RC3, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2023,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924410"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.040214.132781"},{"key":"e_1_3_2_1_3_1","unstructured":"3D Robotics. 2020. Yocto Linux. https:\/\/tinyurl.com\/y2axm74b. (Accessed: 2023-Sep-29)."},{"key":"e_1_3_2_1_4_1","unstructured":"3DR Robotics. 2014. MAVlink Protocol Setup for Solo. https:\/\/github.com\/3drobotics\/mavlink-solo. (Accessed: 2023-Sep-29)."},{"key":"e_1_3_2_1_5_1","unstructured":"3DR Solo Website. 2020. 3DR Solo Website. https:\/\/3dr.com\/solo-drone. Accessed: 2023-Sep-29."},{"key":"e_1_3_2_1_6_1","unstructured":"E. Barker. 2020. NIST Special Publication 800-57 Part 1 \u2013 Revision 5 - Recommendation for key management: Part 1. Technical Report."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"B. Blanchet. 2014. Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif. 54\u201387.","DOI":"10.1007\/978-3-319-10082-1_3"},{"volume-title":"Proc. of Applied Cryptography and Network Security","author":"Couteau Geoffroy","key":"e_1_3_2_1_8_1","unstructured":"Geoffroy Couteau. 2018. New Protocols for Secure Equality Test and Comparison. In Proc. of Applied Cryptography and Network Security. Springer, 303\u2013320."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"E. De\u00a0Cristofaro and G. Tsudik. 2010. Practical Private Set Intersection Protocols with Linear Complexity. In Financial Cryptography and Data Security. 143\u2013159.","DOI":"10.1007\/978-3-642-14577-3_13"},{"key":"e_1_3_2_1_10_1","unstructured":"DJI. 2019. DJI Demonstrates Direct Drone-To-Phone Remote Identification. https:\/\/tinyurl.com\/y39pft7x. (Accessed: 2023-Sep-29)."},{"key":"e_1_3_2_1_11_1","unstructured":"FAA. 2021. Remote Identification of Unmanned Aircraft. Available Online: https:\/\/www.faa.gov\/news\/media\/attachments\/RemoteID_Final_Rule.pdf."},{"key":"e_1_3_2_1_12_1","unstructured":"J. Gelinas. 2019. Look up in the sky! It\u2019s my package. Amazon to start drone delivery \u2018within months\u2019. https:\/\/tinyurl.com\/yrnj9xtj"},{"key":"e_1_3_2_1_13_1","unstructured":"Y. Hsu and R. Gau. 2020. Reinforcement Learning-based Collision Avoidance and Optimal Trajectory Planning in UAV Communication Networks. IEEE Trans. on Mobile Computing (2020) 1\u20131."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2019.10.001"},{"volume-title":"SICE Annual Conf.2122\u20132126","author":"Park J.","key":"e_1_3_2_1_15_1","unstructured":"J. Park, et al.2008. UAV collision avoidance based on geometric approach. In SICE Annual Conf.2122\u20132126."},{"volume-title":"Proc. of Int. Conf. on Future Energy Systems. 109\u2013119","author":"S.","key":"e_1_3_2_1_16_1","unstructured":"Keranidis, S. et al.2014. Experimental Evaluation and Comparative Study on Energy Efficiency of the Evolving IEEE 802.11 Standards. In Proc. of Int. Conf. on Future Energy Systems. 109\u2013119."},{"volume-title":"et al.2019. Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols","author":"N.","key":"e_1_3_2_1_17_1","unstructured":"Kobeissi, N. et al.2019. Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols. In IEEE EuroS&P. 356\u2013370."},{"key":"e_1_3_2_1_18_1","volume-title":"Article 46 (June","author":"Y.","year":"2019","unstructured":"Ma, Y. et al.2019. WiFi Sensing with Channel State Information: A Survey. ACM Comput. Surv. 52, 3, Article 46 (June 2019), 36\u00a0pages."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2432455"},{"volume-title":"Proc. of ACM WiSec. 231\u2013241","author":"Sciancalepore G.","key":"e_1_3_2_1_20_1","unstructured":"Oligeri, G. and Sciancalepore, S. and Raponi, S. and Di Pietro, R.2020. BrokenStrokes: on the (in) security of wireless keyboards. In Proc. of ACM WiSec. 231\u2013241."},{"key":"e_1_3_2_1_21_1","unstructured":"OpenSSL Found.2021. OpenSSL - Cryptography and SSL\/TLS Toolbox. https:\/\/www.openssl.org\/. (Accessed: 2023-Sep-29)."},{"volume-title":"IEEE Int. Conf. on Decision and Control, Vol.\u00a01. 25\u201330","author":"Beard R.","key":"e_1_3_2_1_22_1","unstructured":"R. Beard, et al.2003. Multiple UAV cooperative search under collision avoidance and limited range communication constraints. In IEEE Int. Conf. on Decision and Control, Vol.\u00a01. 25\u201330."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2792443"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22051855"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Sciancalepore S. and George D.2022. Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles. In ACM ACSAC.","DOI":"10.1145\/3564625.3564626"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102739"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3151791"},{"key":"e_1_3_2_1_28_1","volume-title":"Potential Threats, and Future Directions","author":"Tedeschi Pietro","year":"2023","unstructured":"Pietro Tedeschi, Fatima\u00a0Ali Al\u00a0Nuaimi, Ali\u00a0Ismail Awad, and Enrico Natalizio. 2023. Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions. IEEE Transactions on Industrial Informatics (2023), 1\u201312."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Tedeschi P. and Sciancalepore S. and Di Pietro R.2021. ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles. In ACM ACSAC.","DOI":"10.1145\/3485832.3485834"},{"key":"e_1_3_2_1_30_1","volume-title":"R.2022. PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles","author":"Sciancalepore P.","year":"2022","unstructured":"Tedeschi, P. and Sciancalepore, S. and Di Pietro, R.2022. PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles. IEEE Transactions on Dependable and Secure Computing (2022), 1\u20131."},{"key":"e_1_3_2_1_31_1","unstructured":"Tedeschi P. and Sciancalepore S. and Di Pietro R.2022. Source code of LPPD in ProVerif. https:\/\/github.com\/pietrotedeschi\/lppd."},{"key":"e_1_3_2_1_32_1","first-page":"621","article-title":"LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications","volume":"7","author":"Sciancalepore P.","year":"2020","unstructured":"Tedeschi, P. and Sciancalepore, S. and Eliyan, A. and Di Pietro, R.2020. LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications. IEEE IoT Journ. 7, 1 (2020), 621\u2013638.","journal-title":"IEEE IoT Journ."},{"key":"e_1_3_2_1_33_1","unstructured":"Unmanned Airspace. 2019. \u201c526 000 commercial drones to be delivered in 2020\u201d. https:\/\/tinyurl.com\/mr26xmsy. Accessed: 2023-Sep-29."},{"volume-title":"Proc. of ACM CCS. 1313\u20131328","author":"Vanhoef M.","key":"e_1_3_2_1_34_1","unstructured":"M. Vanhoef and F. Piessens. 2017. Key reinstallation attacks: Forcing nonce reuse in WPA2. In Proc. of ACM CCS. 1313\u20131328."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3240477"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2007.899191"},{"volume-title":"Navigation and Control Conf. and Exh.6829","author":"Watanabe Y.","key":"e_1_3_2_1_37_1","unstructured":"Y. Watanabe, et al.2007. Vision-Based Obstacle Avoidance for UAVs. In AIAA Guidance, Navigation and Control Conf. and Exh.6829."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000064"}],"event":{"name":"ACSAC '23: Annual Computer Security Applications Conference","acronym":"ACSAC '23","location":"Austin TX USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627174","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627106.3627174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:38:59Z","timestamp":1755884339000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627174"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":38,"alternative-id":["10.1145\/3627106.3627174","10.1145\/3627106"],"URL":"https:\/\/doi.org\/10.1145\/3627106.3627174","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2023-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}