{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:21:13Z","timestamp":1769728873554,"version":"3.49.0"},"reference-count":0,"publisher":"International Association of Online Engineering (IAOE)","issue":"02","license":[{"start":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T00:00:00Z","timestamp":1769644800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Interact. Mob. Technol."],"abstract":"<jats:p>The rapid evolution of the Internet of Things (IoT) has led to a dramatic increase in the number of connected devices. Consequently, it is no longer feasible to deliver high-quality services using terrestrial infrastructure alone. Unmanned aerial vehicles (UAVs) are increasingly being used to improve the capacity and efficiency of IoT networks due to their maneuverability, economy, and flexibility. In resource-constrained IoT environments, UAVs typically employ batch authentication to securely and efficiently manage simultaneous access requests. However, if even a single signature is invalid, batch authentication will fail, which compromises the system\u2019s availability and reliability. This paper introduces a hybrid dynamic access control architecture that combines batch verification techniques with machine learning (ML) algorithms to detect fraud (i.e., identify invalid signatures) before the batch verification process in order to enhance its efficiency. The experiment\u2019s findings show that using artificial intelligence (AI) before the batch verification process can improve its efficiency and reduces the computational load.<\/jats:p>","DOI":"10.3991\/ijim.v20i02.58623","type":"journal-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T11:19:22Z","timestamp":1769685562000},"source":"Crossref","is-referenced-by-count":0,"title":["AI-Driven Hybrid Batch Authentication for UAV-Assisted Mobile IoT Networks"],"prefix":"10.3991","volume":"20","author":[{"given":"Soukaina","family":"Essafi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9385-7315","authenticated-orcid":false,"given":"Ahmed","family":"El-Yahyaoui","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1468-1751","authenticated-orcid":false,"given":"Ali","family":"Ouacha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5743-377X","authenticated-orcid":false,"given":"Iyad","family":"Lahsen-Cherif","sequence":"additional","affiliation":[]}],"member":"2371","published-online":{"date-parts":[[2026,1,29]]},"container-title":["International Journal of Interactive Mobile Technologies (iJIM)"],"original-title":[],"link":[{"URL":"https:\/\/online-journals.org\/index.php\/i-jim\/article\/download\/58623\/16979","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/online-journals.org\/index.php\/i-jim\/article\/download\/58623\/16979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T11:19:22Z","timestamp":1769685562000},"score":1,"resource":{"primary":{"URL":"https:\/\/online-journals.org\/index.php\/i-jim\/article\/view\/58623"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,29]]},"references-count":0,"journal-issue":{"issue":"02","published-online":{"date-parts":[[2026,1,29]]}},"URL":"https:\/\/doi.org\/10.3991\/ijim.v20i02.58623","relation":{},"ISSN":["1865-7923"],"issn-type":[{"value":"1865-7923","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,29]]}}}