{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:32:06Z","timestamp":1774539126334,"version":"3.50.1"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072170, 61976087, U22A2034, 62177047"],"award-info":[{"award-number":["62072170, 61976087, U22A2034, 62177047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Science and Technology Project of the Department of Communications of Hunan Provincial","award":["202101"],"award-info":[{"award-number":["202101"]}]},{"name":"Key Research and Development Program of Hunan Province","award":["2022GK2015"],"award-info":[{"award-number":["2022GK2015"]}]},{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"crossref","award":["2021JJ30141"],"award-info":[{"award-number":["2021JJ30141"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Central South University Research Programme of Advanced Interdisciplinary Studies","award":["2023QYJC020"],"award-info":[{"award-number":["2023QYJC020"]}]},{"name":"King Saud University, Riyadh, Saudi Arabia","award":["RSP2024R12"],"award-info":[{"award-number":["RSP2024R12"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2024,5,31]]},"abstract":"<jats:p>The visual information processing technology based on deep learning can play many important yet assistant roles for unmanned aerial vehicles (UAV) navigation in complex environments. Traditional centralized architectures usually rely on a cloud server to perform model inference tasks, which can lead to long communication latency. Using transfer learning to unload deep neural networks to the edge-fog collaborative networks has become a new paradigm for dealing with the conflicts between computing resources and communication latency. However, ensuring the security of edge-fog collaborative networks entity remains challenging. For such, we propose an anonymous authentication and group key agreement scheme for the UAV-enabled edge-fog collaborative networks, consisting of the UAV authentication protocol and the collaborative networks authentication protocol. Utilizing the AVISPA assessment tool and security analysis, the security requirements and functional features of the proposed scheme are demonstrated. From the performance results of the proposed scheme, we show that it is superior to existing authentication schemes and promising.<\/jats:p>","DOI":"10.1145\/3657292","type":"journal-article","created":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T12:26:01Z","timestamp":1712751961000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3100-0006","authenticated-orcid":false,"given":"Xiangwei","family":"Meng","sequence":"first","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5074-1363","authenticated-orcid":false,"given":"Wei","family":"Liang","sequence":"additional","affiliation":[{"name":"Hunan University of Science and Technology, Xiangtan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6861-5277","authenticated-orcid":false,"given":"Zisang","family":"Xu","sequence":"additional","affiliation":[{"name":"Changsha University of Science and Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2018-4383","authenticated-orcid":false,"given":"Kuanching","family":"Li","sequence":"additional","affiliation":[{"name":"Hunan University of Science and Technology, Xiangtan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6636-0533","authenticated-orcid":false,"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[{"name":"King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9957-7867","authenticated-orcid":false,"given":"Xiaoyan","family":"Kui","sequence":"additional","affiliation":[{"name":"Central South University,  Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,6]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977817"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3033060"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971172"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.3390\/app10093149"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"issue":"1","key":"e_1_3_1_7_2","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.comcom.2020.03.009","article-title":"A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications","volume":"155","author":"Ever YoneyKirsal","year":"2020","unstructured":"YoneyKirsal Ever. 2020. A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications. Computer Communications 155, 1 (2020), 143\u2013149.","journal-title":"Computer Communications"},{"issue":"3","key":"e_1_3_1_8_2","first-page":"219","article-title":"An introduction to deep reinforcement learning","volume":"11","author":"Fran\u00e7ois-Lavet Vincent","year":"2018","unstructured":"Vincent Fran\u00e7ois-Lavet, Peter Henderson, Riashat Islam, Marc G. Bellemare, and Joelle Pineau. 2018. An introduction to deep reinforcement learning. IEEE Transactions on Mobile Computing 11, 3-4 (2018), 219\u2013354.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4179"},{"issue":"5","key":"e_1_3_1_10_2","doi-asserted-by":"crossref","first-page":"2685","DOI":"10.1109\/TSC.2021.3066006","article-title":"Drone-as-a-service composition under uncertainty","volume":"15","author":"Hamdi Ali","year":"2021","unstructured":"Ali Hamdi, Flora D. Salim, Du Yong Kim, Azadeh Ghari Neiat, and Athman Bouguettaya. 2021. Drone-as-a-service composition under uncertainty. IEEE Transactions on Services Computing 15, 5 (2021), 2685\u20132698.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805798"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3326066"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.3390\/rs13173364"},{"issue":"6","key":"e_1_3_1_14_2","first-page":"1089","article-title":"OCTOPUS: An edge-fog mutual authentication scheme","volume":"18","author":"Ibrahim Maged Hamada","year":"2016","unstructured":"Maged Hamada Ibrahim. 2016. OCTOPUS: An edge-fog mutual authentication scheme. International Journal of Network Security 18, 6 (2016), 1089\u20131101.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.001"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2971254"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2022.3204188"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3156266"},{"key":"e_1_3_1_19_2","article-title":"QoS prediction and adversarial attack protection for distributed services under DLaaS","author":"Liang Wei","year":"2023","unstructured":"Wei Liang, Yuhui Li, Jianlong Xu, ZhengQin, Dafang Zhang, and Kuan-Ching Li. 2023. QoS prediction and adversarial attack protection for distributed services under DLaaS. IEEE Transactions on Computers 73, 3 (2023), 669\u2013682. DOI:https:\/\/doi:10.1109\/TC.2021.3077738","journal-title":"IEEE Transactions on Computers"},{"key":"e_1_3_1_20_2","volume-title":"IEEE Transactions on Reliability.","author":"Liang Wei","year":"2022","unstructured":"Wei Liang, Yang Yang, Ce Yang, Yonghua Hu, Songyou Xie, Kuan-Ching Li, and Jiannong Cao. 2022. PDPChain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Transactions on Reliability. Published Online, August 5, 2022. DOI:https:\/\/doi:10.1109\/TR.2022.3190932"},{"issue":"3","key":"e_1_3_1_21_2","doi-asserted-by":"crossref","first-page":"1410","DOI":"10.1109\/TETC.2020.2993032","article-title":"Circuit copyright blockchain: Blockchain-based homomorphic encryption for IP circuit protection","volume":"9","author":"Liang Wei","year":"2020","unstructured":"Wei Liang, Dafang Zhang, Xia Lei, Mingdong Tang, Kuan-Ching Li, and Albert Zomaya. 2020. Circuit copyright blockchain: Blockchain-based homomorphic encryption for IP circuit protection. IEEE Transactions on Emerging Topics in Computing 9, 3 (2020), 1410\u20131420.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2908171"},{"key":"e_1_3_1_23_2","volume-title":"IEEE Transactions on Industrial Informatics.","author":"Long Jing","year":"2022","unstructured":"Jing Long, Wei Liang, Kuan-Ching Li, Yehua Wei, and Mario Donato Marino. 2022. A regularized cross-layer ladder network for intrusion detection in Industrial Internet-of-Things. IEEE Transactions on Industrial Informatics. Published Online, September 5, 2022. DOI:https:\/\/doi:10.1109\/TII.2022.3204034"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3157957"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00673-x"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02252-z"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600238CM"},{"issue":"6","key":"e_1_3_1_28_2","doi-asserted-by":"crossref","first-page":"747","DOI":"10.3390\/electronics10060747","article-title":"Modeling small UAV micro-Doppler signature using millimeter-wave FMCW radar","volume":"10","author":"Passafiume Marco","year":"2021","unstructured":"Marco Passafiume, Neda Rojhani, Giovanni Collodi, and Alessandro Cidronali. 2021. Modeling small UAV micro-Doppler signature using millimeter-wave FMCW radar. Electronics 10, 6 (2021), 747\u2013763.","journal-title":"Electronics"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3040989"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2911672"},{"key":"e_1_3_1_31_2","first-page":"342","volume-title":"Proceedings of the 17th International Conference on Pattern Recognition.","author":"Sugimoto Shigeki","year":"2004","unstructured":"Shigeki Sugimoto, Hayato Tatesa, Hidekazu Takahashi, and Masatoshi Okutumi. 2004. Obstacle detection using millimeter-wave radar and its visualization on image sequence. In Proceedings of the 17th International Conference on Pattern Recognition.342\u2013345."},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.037"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2968311"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102024"},{"issue":"10","key":"e_1_3_1_36_2","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1049\/cmu2.12295","article-title":"A PUF\u2010based lightweight authentication and key agreement protocol for smart UAV networks","volume":"16","author":"Wang Wenming","year":"2022","unstructured":"Wenming Wang, Haiping Huang, Lingyan Xue, Qi Li, Reza Malekian, and Youzhi Zhang. 2022. A PUF\u2010based lightweight authentication and key agreement protocol for smart UAV networks. IET Communications 16, 10 (2022), 1142\u20131159.","journal-title":"IET Communications"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.3390\/rs13061064"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2888821"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3318460"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918585"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3129631"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3029784"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.023"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2017.7989381"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3657292","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3657292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:39Z","timestamp":1750295859000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3657292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,5,31]]}},"alternative-id":["10.1145\/3657292"],"URL":"https:\/\/doi.org\/10.1145\/3657292","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,6]]},"assertion":[{"value":"2022-12-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-03-27","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}