{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T05:07:26Z","timestamp":1741410446965,"version":"3.38.0"},"reference-count":50,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.056960","type":"journal-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T06:41:46Z","timestamp":1729060906000},"page":"2195-2217","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Transmission Scheme for Blocks in Blockchain-Based Unmanned Aerial Vehicle Communication Systems"],"prefix":"10.32604","volume":"81","author":[{"given":"Ting","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shuna","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Jianchuan","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Xiujuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chuanwen","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Hong","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/MWC.2018.1800365","article-title":"Optimizing space-air-ground integrated networks by artificial intelligence","volume":"26","author":"Kato","year":"Aug. 2019","journal-title":"IEEE Wirel. Commun."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"3417","DOI":"10.1109\/COMST.2019.2906228","article-title":"Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges","volume":"21","author":"Fotouhi","year":"Dec. 2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref3","first-page":"162","article-title":"Fine-grained trajectory optimization of multiple UAVs for efficient data gathering from WSNs","volume":"29","author":"Luo","year":"Feb. 2021","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2109","DOI":"10.1109\/TWC.2017.2789293","article-title":"Joint trajectory and communication design for multi-UAV enabled wireless networks","volume":"17","author":"Wu","year":"Mar. 2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TWC.2021.3105821","article-title":"UAV relay-assisted emergency communications in IoT networks: Resource allocation and trajectory optimization","volume":"21","author":"Tran","year":"Mar. 2022","journal-title":"IEEE Trans. Wirel. Commun."},{"doi-asserted-by":"crossref","unstructured":"Z. Su, Y. Wang, Q. Xu, and N. Zhang, \u201cLVBS: Lightweight vehicular blockchain for secure data sharing in disaster rescue,\u201d IEEE Trans. Dependable Secur. Comput., vol. 19, no. 1, pp. 19\u201332, Jan.\u2013Feb. 2022. doi: 10.1109\/TDSC.2020.2980255.","key":"ref6","DOI":"10.1109\/TDSC.2020.2980255"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"872","DOI":"10.1109\/TCCN.2020.2968311","article-title":"Cognition in UAV-aided 5G and beyond communications: A survey","volume":"6","author":"Ullah","year":"Sep. 2020","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2045","DOI":"10.1109\/JSAC.2018.2864418","article-title":"Cooperative UAV cluster-assisted terrestrial cellular networks for ubiquitous coverage","volume":"36","author":"Wu","year":"Sep. 2018","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2514","DOI":"10.1109\/TNSE.2022.3203790","article-title":"Smart collaborative evolvement for virtual group creation in customized industrial IoT","volume":"10","author":"Song","year":"1 Sep.\u2013Oct. 2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"64486","DOI":"10.1109\/ACCESS.2020.2985580","article-title":"Blockchain based dynamic spectrum access of non-real-time data in cyber-physical-social systems","volume":"8","author":"Fan","year":"2020","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"11280","DOI":"10.1109\/TVT.2018.2868944","article-title":"Improving physical layer security via a UAV friendly jammer for unknown eavesdropper location","volume":"67","author":"Zhou","year":"Nov. 2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2693","DOI":"10.1109\/LWC.2021.3112752","article-title":"Secrecy performance analysis of IRS-aided UAV relay system","volume":"10","author":"Wang","year":"Dec. 2021","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"7802","DOI":"10.1109\/TWC.2023.3344802","article-title":"Secure short-packet communications via UAV-enabled mobile relaying: Joint resource optimization and 3D trajectory design","volume":"23","author":"Mamaghani","year":"Jul. 2024","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref14","series-title":"2021 IEEE Int. Conf. Commun. Workshops","first-page":"1","article-title":"Hybrid uplink-downlink NOMA for secure coordinated multi-point networks","author":"Fan","year":"2021"},{"key":"ref15","series-title":"2019 IEEE Glob. Commun. Conf.","first-page":"1","article-title":"Security analysis of cooperative jamming in Internet of Things with multiple eavesdroppers","author":"Fan","year":"2019"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1016\/j.simpat.2022.102621","article-title":"A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system","volume":"120","author":"Kumar","year":"2022, Art. no. 102621","journal-title":"Simul Model. Pract. Theory."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MNET.2015.7018202","article-title":"Improving physical-layer security in wireless communications using diversity techniques","volume":"29","author":"Zou","year":"Jan.\u2013Feb. 2015","journal-title":"IEEE Netw."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"4022","DOI":"10.1109\/TCOMM.2020.2979977","article-title":"Robust trajectory and transmit power optimization for secure UAV-enabled cognitive radio networks","volume":"68","author":"Zhou","year":"Jul. 2020","journal-title":"IEEE Trans. Commun."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2798","DOI":"10.1109\/JSAC.2020.3005489","article-title":"Energy efficiency optimization for NOMA UAV network with imperfect CSI","volume":"38","author":"Zhang","year":"Dec. 2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"5028","DOI":"10.1109\/TCOMM.2020.2990994","article-title":"Joint precoding optimization for secure SWIPT in UAV-aided NOMA networks","volume":"68","author":"Wang","year":"Aug. 2020","journal-title":"IEEE Trans. Commun."},{"key":"ref21","series-title":"Int. Conf. Wirel. Algorithms, Syst. Appl.","first-page":"483","article-title":"Space power synthesis-based cooperative jamming for unknown channel state information","author":"Fan","year":"2017"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1177\/1550147720933464","article-title":"Cooperative secure transmission against collusive eavesdroppers in Internet of Things","volume":"16","author":"Fan","year":"2020, Art. no. 155014772093346","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"25596","DOI":"10.1109\/JIOT.2022.3197975","article-title":"Secure swarm UAV-assisted communications with cooperative friendly jamming","volume":"9","author":"Dang-Ngoc","year":"Dec. 15, 2022","journal-title":"IEEE Internet Things J."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1230","DOI":"10.1109\/JIOT.2019.2953903","article-title":"Safeguarding UAV IoT communication systems against randomly located eavesdroppers","volume":"7","author":"Lei","year":"Feb. 2020","journal-title":"IEEE Internet Things J."},{"key":"ref25","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/MWC.001.2000454","article-title":"Covert communication in UAV-assisted air-ground networks","volume":"28","author":"Jiang","year":"Aug. 2021","journal-title":"IEEE Wirel. Commun."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"4530","DOI":"10.1109\/TMC.2022.3162117","article-title":"BLOWN: A blockchain protocol for single-hop wireless networks under adversarial SINR","volume":"22","author":"Xu","year":"Aug. 1, 2023","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"4069","DOI":"10.1109\/TVT.2019.2900157","article-title":"UAV-enabled secure communications: Joint trajectory and transmit power optimization","volume":"68","author":"Zhou","year":"Apr. 2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref28","first-page":"1","article-title":"Securing UAV communications via trajectory optimization","author":"Zhang","year":"2017","journal-title":"IEEE Glob. Commun. Conf."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1109\/LWC.2023.3238510","article-title":"Optimal hovering height and power allocation for UAV-aided NOMA covert communication system","volume":"12","author":"Su","year":"Jun. 2023","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1109\/TWC.2023.3281730","article-title":"Joint power allocation and trajectory design for UAV-enabled covert communication","volume":"23","author":"Wu","year":"Jan. 2024","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TIFS.2018.2846257","article-title":"Delay-intolerant covert communications with either fixed or random transmit power","volume":"14","author":"Yan","year":"Jan. 2019","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1109\/LWC.2019.2894617","article-title":"Delay-constrained covert communications with a full-duplex receiver","volume":"8","author":"Shu","year":"Jun. 2019","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref33","doi-asserted-by":"crossref","first-page":"9457","DOI":"10.1109\/TWC.2023.3270925","article-title":"Joint optimization for secure and reliable communications in finite blocklength regime","volume":"22","author":"Oh","year":"Dec. 2023","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"16309","DOI":"10.1109\/TVT.2020.3042791","article-title":"UAV-enabled secure communication with finite blocklength","volume":"69","author":"Wang","year":"Dec. 2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1016\/j.aeue.2022.154434","article-title":"Mobile jammer enabled secure UAV communication with short packet transmission","volume":"157","author":"Han","year":"2022, Art. no. 154434","journal-title":"AEU-Int. J. Electron. Commun."},{"key":"ref36","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s12599-017-0505-1","article-title":"Blockchain technology in business and information systems research","volume":"59","author":"Beck","year":"2017","journal-title":"Bus Inf. Syst. Eng."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/3369752","article-title":"Blockchain technology: What is it good for?","volume":"63","author":"Ammous","year":"2019","journal-title":"Commun. ACM"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1007\/s11432-022-3658-7","article-title":"Blockchain-based vehicular edge computing networks: The communication perspective","volume":"66","author":"He","year":"2023, Art. no. 172301","journal-title":"Sci. China Inf. Sci."},{"key":"ref39","doi-asserted-by":"crossref","first-page":"18961","DOI":"10.1109\/JIOT.2023.3277923","article-title":"Blockchain for intelligent transportation systems: Applications, challenges, and opportunities","volume":"10","author":"Das","year":"Nov. 2023","journal-title":"IEEE Internet Things J."},{"key":"ref40","doi-asserted-by":"crossref","first-page":"15310","DOI":"10.1109\/JIOT.2023.3346296","article-title":"Efficient information dissemination in blockchain-enabled federated learning for IoV","volume":"11","author":"Ghimire","year":"May 2024","journal-title":"IEEE Internet Things J."},{"key":"ref41","doi-asserted-by":"crossref","first-page":"4660","DOI":"10.1109\/JIOT.2018.2875542","article-title":"Blockchain for secure and efficient data sharing in vehicular edge computing and networks","volume":"6","author":"Kang","year":"Jun. 2019","journal-title":"IEEE Internet Things J."},{"key":"ref42","doi-asserted-by":"crossref","first-page":"5983","DOI":"10.1109\/TVT.2022.3163960","article-title":"LBSV: Lightweight blockchain security protocol for secure storage and communication in SDN-enabled IoV","volume":"71","author":"Vishwakarma","year":"Jun. 2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref43","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MNET.011.2000202","article-title":"Blockchain-empowered drone networks: Architecture, features, and future","volume":"35","author":"Chang","year":"Jan.\/Feb. 2021","journal-title":"IEEE Netw."},{"key":"ref44","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1109\/JCN.2019.000050","article-title":"BUAV: A blockchain-based secure UAV-assisted data acquisition scheme in Internet of Things","volume":"21","author":"Islam","year":"Oct. 2019","journal-title":"J. Commun. Netw."},{"key":"ref45","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MNET.011.2000177","article-title":"Blockchain-empowered trusted networking for unmanned aerial vehicles in the B5G era","volume":"35","author":"Jian","year":"Jan.\/Feb. 2021","journal-title":"IEEE Netw."},{"key":"ref46","doi-asserted-by":"crossref","first-page":"2422","DOI":"10.1109\/TNET.2022.3226458","article-title":"A secure and intelligent data sharing scheme for UAV-assisted disaster rescue","volume":"31","author":"Wang","year":"Dec. 2023","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref47","series-title":"Proc. IEEE 95th Veh. Technol. Conf.","first-page":"1","article-title":"Blockchain-enabled FD-NOMA-based vehicular network with physical layer security","author":"Ayaz","year":"2022"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"2565","DOI":"10.1109\/TWC.2019.2904968","article-title":"Secure short-packet communications for mission-critical IoT applications","volume":"18","author":"Wang","year":"May 2019","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref49","doi-asserted-by":"crossref","first-page":"406","DOI":"10.3906\/elk-2105-217","article-title":"Block size optimization for PoW consensus algorithm-based blockchain applications by using whale optimization algorithm","volume":"30","author":"Ayg\u00fcn","year":"2022","journal-title":"Turk J. Electr. Eng. Comput. Sci."},{"unstructured":"M. Grant and S. Boyd, \u201cCVX: Matlab software for disciplined convex programming, Version 2.2,\u201d Jan. 2020. Accessed: Jun. 13, 2024. [Online]. Available: http:\/\/cvxr.com\/cvx","key":"ref50"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_56960\/TSP_CMC_56960.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:19:14Z","timestamp":1741321154000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58666"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":50,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.056960","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-08-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-25","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}