Blockchain-Enabled Identity Based Authentication Scheme for Cellular Connected Drones Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.3390/s25226935
The proliferation of drones across precision agriculture, disaster response operations, and delivery services has accentuated the critical need for secure communication frameworks. Due to the limited computational capabilities of drones and the fragility of real-time wireless communication networks, the cellular connected drones confront mounting cybersecurity threats. Traditional authentication mechanisms, such as public-key infrastructure-based authentication, and identity-based authentication, are centralized and have high computational costs, which may result in single point of failure. To address these issues, this paper proposes a blockchain-enabled authentication and key agreement scheme for cellular-connected drones. Leveraging identity-based cryptography (IBC) and the Message Queuing Telemetry Transport (MQTT), the scheme flow is optimized to reduce the communication rounds in the authentication. By integrating MQTT brokers with the blockchain, it enables drones to authenticate through any network node, thereby enhancing system scalability and availability. Additionally, cryptographic performance is optimized via precompiled smart contracts, enabling efficient execution of complex operations. Comprehensive experimental evaluations validate the performance, scalability, robustness, and resource efficiency of the proposed scheme, and show that the system delivers near-linear scalability and accelerated on-chain verification.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.3390/s25226935
- https://www.mdpi.com/1424-8220/25/22/6935/pdf?version=1763043753
- OA Status
- gold
- References
- 26
- OpenAlex ID
- https://openalex.org/W4416228716
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4416228716Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.3390/s25226935Digital Object Identifier
- Title
-
Blockchain-Enabled Identity Based Authentication Scheme for Cellular Connected DronesWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-11-13Full publication date if available
- Authors
-
Zeyuan Li, Yufei Zhang, Xun Gui, Xue Deng, Jun FuList of authors in order
- Landing page
-
https://doi.org/10.3390/s25226935Publisher landing page
- PDF URL
-
https://www.mdpi.com/1424-8220/25/22/6935/pdf?version=1763043753Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.mdpi.com/1424-8220/25/22/6935/pdf?version=1763043753Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
26Number of works referenced by this work
Full payload
| id | https://openalex.org/W4416228716 |
|---|---|
| doi | https://doi.org/10.3390/s25226935 |
| ids.doi | https://doi.org/10.3390/s25226935 |
| ids.pmid | https://pubmed.ncbi.nlm.nih.gov/41305150 |
| ids.openalex | https://openalex.org/W4416228716 |
| fwci | |
| type | article |
| title | Blockchain-Enabled Identity Based Authentication Scheme for Cellular Connected Drones |
| biblio.issue | 22 |
| biblio.volume | 25 |
| biblio.last_page | 6935 |
| biblio.first_page | 6935 |
| is_xpac | False |
| apc_list.value | 2400 |
| apc_list.currency | CHF |
| apc_list.value_usd | 2598 |
| apc_paid.value | 2400 |
| apc_paid.currency | CHF |
| apc_paid.value_usd | 2598 |
| language | en |
| locations[0].id | doi:10.3390/s25226935 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S101949793 |
| locations[0].source.issn | 1424-8220 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1424-8220 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Sensors |
| locations[0].source.host_organization | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.mdpi.com/1424-8220/25/22/6935/pdf?version=1763043753 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Sensors |
| locations[0].landing_page_url | https://doi.org/10.3390/s25226935 |
| locations[1].id | pmid:41305150 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306525036 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | PubMed |
| locations[1].source.host_organization | https://openalex.org/I1299303238 |
| locations[1].source.host_organization_name | National Institutes of Health |
| locations[1].source.host_organization_lineage | https://openalex.org/I1299303238 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | publishedVersion |
| locations[1].raw_type | |
| locations[1].license_id | |
| locations[1].is_accepted | True |
| locations[1].is_published | True |
| locations[1].raw_source_name | Sensors (Basel, Switzerland) |
| locations[1].landing_page_url | https://pubmed.ncbi.nlm.nih.gov/41305150 |
| locations[2].id | pmh:oai:doaj.org/article:364136f1cf0246cc9d98c3d7b37081ad |
| locations[2].is_oa | False |
| locations[2].source.id | https://openalex.org/S4306401280 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[2].source.host_organization | |
| locations[2].source.host_organization_name | |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | article |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | Sensors, Vol 25, Iss 22, p 6935 (2025) |
| locations[2].landing_page_url | https://doaj.org/article/364136f1cf0246cc9d98c3d7b37081ad |
| indexed_in | crossref, doaj, pubmed |
| authorships[0].author.id | https://openalex.org/A5031476612 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-1691-9487 |
| authorships[0].author.display_name | Zeyuan Li |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I180662265 |
| authorships[0].affiliations[0].raw_affiliation_string | China Mobile Chengdu Institute of Research and Development, Chengdu 610041, China |
| authorships[0].institutions[0].id | https://openalex.org/I180662265 |
| authorships[0].institutions[0].ror | https://ror.org/05gftfe97 |
| authorships[0].institutions[0].type | company |
| authorships[0].institutions[0].lineage | https://openalex.org/I180662265 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | China Mobile (China) |
| authorships[0].author_position | middle |
| authorships[0].raw_author_name | Zeyuan Li |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | China Mobile Chengdu Institute of Research and Development, Chengdu 610041, China |
| authorships[1].author.id | https://openalex.org/A5100324346 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-1555-5888 |
| authorships[1].author.display_name | Yufei Zhang |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I180662265 |
| authorships[1].affiliations[0].raw_affiliation_string | China Mobile Chengdu Institute of Research and Development, Chengdu 610041, China |
| authorships[1].affiliations[1].institution_ids | https://openalex.org/I150229711 |
| authorships[1].affiliations[1].raw_affiliation_string | School of Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, China |
| authorships[1].institutions[0].id | https://openalex.org/I180662265 |
| authorships[1].institutions[0].ror | https://ror.org/05gftfe97 |
| authorships[1].institutions[0].type | company |
| authorships[1].institutions[0].lineage | https://openalex.org/I180662265 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | China Mobile (China) |
| authorships[1].institutions[1].id | https://openalex.org/I150229711 |
| authorships[1].institutions[1].ror | https://ror.org/04qr3zq92 |
| authorships[1].institutions[1].type | education |
| authorships[1].institutions[1].lineage | https://openalex.org/I150229711 |
| authorships[1].institutions[1].country_code | CN |
| authorships[1].institutions[1].display_name | University of Electronic Science and Technology of China |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Yufei Zhang |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | China Mobile Chengdu Institute of Research and Development, Chengdu 610041, China, School of Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, China |
| authorships[2].author.id | https://openalex.org/A5002760106 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-5070-3527 |
| authorships[2].author.display_name | Xun Gui |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I150229711 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, China |
| authorships[2].institutions[0].id | https://openalex.org/I150229711 |
| authorships[2].institutions[0].ror | https://ror.org/04qr3zq92 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I150229711 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | University of Electronic Science and Technology of China |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Xun Gui |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | School of Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, China |
| authorships[3].author.id | https://openalex.org/A5101472790 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-8644-1362 |
| authorships[3].author.display_name | Xue Deng |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I150229711 |
| authorships[3].affiliations[0].raw_affiliation_string | School of Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, China |
| authorships[3].institutions[0].id | https://openalex.org/I150229711 |
| authorships[3].institutions[0].ror | https://ror.org/04qr3zq92 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I150229711 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | University of Electronic Science and Technology of China |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Xue Deng |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | School of Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, China |
| authorships[4].author.id | https://openalex.org/A5101758238 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-5734-7134 |
| authorships[4].author.display_name | Jun Fu |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I180662265 |
| authorships[4].affiliations[0].raw_affiliation_string | China Mobile Chengdu Institute of Research and Development, Chengdu 610041, China |
| authorships[4].institutions[0].id | https://openalex.org/I180662265 |
| authorships[4].institutions[0].ror | https://ror.org/05gftfe97 |
| authorships[4].institutions[0].type | company |
| authorships[4].institutions[0].lineage | https://openalex.org/I180662265 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | China Mobile (China) |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Jun Fu |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | China Mobile Chengdu Institute of Research and Development, Chengdu 610041, China |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.mdpi.com/1424-8220/25/22/6935/pdf?version=1763043753 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-11-14T00:00:00 |
| display_name | Blockchain-Enabled Identity Based Authentication Scheme for Cellular Connected Drones |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-28T23:14:17.795251 |
| primary_topic | |
| cited_by_count | 0 |
| locations_count | 3 |
| best_oa_location.id | doi:10.3390/s25226935 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S101949793 |
| best_oa_location.source.issn | 1424-8220 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1424-8220 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Sensors |
| best_oa_location.source.host_organization | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.mdpi.com/1424-8220/25/22/6935/pdf?version=1763043753 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Sensors |
| best_oa_location.landing_page_url | https://doi.org/10.3390/s25226935 |
| primary_location.id | doi:10.3390/s25226935 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S101949793 |
| primary_location.source.issn | 1424-8220 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1424-8220 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Sensors |
| primary_location.source.host_organization | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.mdpi.com/1424-8220/25/22/6935/pdf?version=1763043753 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Sensors |
| primary_location.landing_page_url | https://doi.org/10.3390/s25226935 |
| publication_date | 2025-11-13 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W3204694058, https://openalex.org/W4377969141, https://openalex.org/W4313008285, https://openalex.org/W4400188366, https://openalex.org/W4402661222, https://openalex.org/W3202150210, https://openalex.org/W4385076331, https://openalex.org/W3157894430, https://openalex.org/W4285153801, https://openalex.org/W3167014088, https://openalex.org/W2748568982, https://openalex.org/W4296131168, https://openalex.org/W4213455878, https://openalex.org/W3148425738, https://openalex.org/W2907807152, https://openalex.org/W2963550505, https://openalex.org/W4322768911, https://openalex.org/W4295260660, https://openalex.org/W4409156135, https://openalex.org/W4210268633, https://openalex.org/W4291805243, https://openalex.org/W4224299815, https://openalex.org/W2976695157, https://openalex.org/W4411599639, https://openalex.org/W4387219734, https://openalex.org/W4390284839 |
| referenced_works_count | 26 |
| abstract_inverted_index.a | 79 |
| abstract_inverted_index.By | 113 |
| abstract_inverted_index.To | 72 |
| abstract_inverted_index.as | 50 |
| abstract_inverted_index.in | 67, 110 |
| abstract_inverted_index.is | 103, 138 |
| abstract_inverted_index.it | 120 |
| abstract_inverted_index.of | 2, 28, 33, 70, 147, 161 |
| abstract_inverted_index.to | 23, 105, 123 |
| abstract_inverted_index.Due | 22 |
| abstract_inverted_index.The | 0 |
| abstract_inverted_index.and | 10, 30, 54, 59, 82, 93, 133, 158, 165, 173 |
| abstract_inverted_index.any | 126 |
| abstract_inverted_index.are | 57 |
| abstract_inverted_index.for | 18, 86 |
| abstract_inverted_index.has | 13 |
| abstract_inverted_index.key | 83 |
| abstract_inverted_index.may | 65 |
| abstract_inverted_index.the | 15, 24, 31, 38, 94, 100, 107, 111, 118, 154, 162, 168 |
| abstract_inverted_index.via | 140 |
| abstract_inverted_index.MQTT | 115 |
| abstract_inverted_index.flow | 102 |
| abstract_inverted_index.have | 60 |
| abstract_inverted_index.high | 61 |
| abstract_inverted_index.need | 17 |
| abstract_inverted_index.show | 166 |
| abstract_inverted_index.such | 49 |
| abstract_inverted_index.that | 167 |
| abstract_inverted_index.this | 76 |
| abstract_inverted_index.with | 117 |
| abstract_inverted_index.(IBC) | 92 |
| abstract_inverted_index.node, | 128 |
| abstract_inverted_index.paper | 77 |
| abstract_inverted_index.point | 69 |
| abstract_inverted_index.smart | 142 |
| abstract_inverted_index.these | 74 |
| abstract_inverted_index.which | 64 |
| abstract_inverted_index.across | 4 |
| abstract_inverted_index.costs, | 63 |
| abstract_inverted_index.drones | 3, 29, 41, 122 |
| abstract_inverted_index.reduce | 106 |
| abstract_inverted_index.result | 66 |
| abstract_inverted_index.rounds | 109 |
| abstract_inverted_index.scheme | 85, 101 |
| abstract_inverted_index.secure | 19 |
| abstract_inverted_index.single | 68 |
| abstract_inverted_index.system | 131, 169 |
| abstract_inverted_index.(MQTT), | 99 |
| abstract_inverted_index.Message | 95 |
| abstract_inverted_index.Queuing | 96 |
| abstract_inverted_index.address | 73 |
| abstract_inverted_index.brokers | 116 |
| abstract_inverted_index.complex | 148 |
| abstract_inverted_index.drones. | 88 |
| abstract_inverted_index.enables | 121 |
| abstract_inverted_index.issues, | 75 |
| abstract_inverted_index.limited | 25 |
| abstract_inverted_index.network | 127 |
| abstract_inverted_index.scheme, | 164 |
| abstract_inverted_index.thereby | 129 |
| abstract_inverted_index.through | 125 |
| abstract_inverted_index.cellular | 39 |
| abstract_inverted_index.confront | 42 |
| abstract_inverted_index.critical | 16 |
| abstract_inverted_index.delivers | 170 |
| abstract_inverted_index.delivery | 11 |
| abstract_inverted_index.disaster | 7 |
| abstract_inverted_index.enabling | 144 |
| abstract_inverted_index.failure. | 71 |
| abstract_inverted_index.mounting | 43 |
| abstract_inverted_index.on-chain | 175 |
| abstract_inverted_index.proposed | 163 |
| abstract_inverted_index.proposes | 78 |
| abstract_inverted_index.resource | 159 |
| abstract_inverted_index.response | 8 |
| abstract_inverted_index.services | 12 |
| abstract_inverted_index.threats. | 45 |
| abstract_inverted_index.validate | 153 |
| abstract_inverted_index.wireless | 35 |
| abstract_inverted_index.Telemetry | 97 |
| abstract_inverted_index.Transport | 98 |
| abstract_inverted_index.agreement | 84 |
| abstract_inverted_index.connected | 40 |
| abstract_inverted_index.efficient | 145 |
| abstract_inverted_index.enhancing | 130 |
| abstract_inverted_index.execution | 146 |
| abstract_inverted_index.fragility | 32 |
| abstract_inverted_index.networks, | 37 |
| abstract_inverted_index.optimized | 104, 139 |
| abstract_inverted_index.precision | 5 |
| abstract_inverted_index.real-time | 34 |
| abstract_inverted_index.Leveraging | 89 |
| abstract_inverted_index.contracts, | 143 |
| abstract_inverted_index.efficiency | 160 |
| abstract_inverted_index.public-key | 51 |
| abstract_inverted_index.Traditional | 46 |
| abstract_inverted_index.accelerated | 174 |
| abstract_inverted_index.accentuated | 14 |
| abstract_inverted_index.blockchain, | 119 |
| abstract_inverted_index.centralized | 58 |
| abstract_inverted_index.evaluations | 152 |
| abstract_inverted_index.frameworks. | 21 |
| abstract_inverted_index.integrating | 114 |
| abstract_inverted_index.mechanisms, | 48 |
| abstract_inverted_index.near-linear | 171 |
| abstract_inverted_index.operations, | 9 |
| abstract_inverted_index.operations. | 149 |
| abstract_inverted_index.performance | 137 |
| abstract_inverted_index.precompiled | 141 |
| abstract_inverted_index.robustness, | 157 |
| abstract_inverted_index.scalability | 132, 172 |
| abstract_inverted_index.agriculture, | 6 |
| abstract_inverted_index.authenticate | 124 |
| abstract_inverted_index.capabilities | 27 |
| abstract_inverted_index.cryptography | 91 |
| abstract_inverted_index.experimental | 151 |
| abstract_inverted_index.performance, | 155 |
| abstract_inverted_index.scalability, | 156 |
| abstract_inverted_index.Additionally, | 135 |
| abstract_inverted_index.Comprehensive | 150 |
| abstract_inverted_index.availability. | 134 |
| abstract_inverted_index.communication | 20, 36, 108 |
| abstract_inverted_index.computational | 26, 62 |
| abstract_inverted_index.cryptographic | 136 |
| abstract_inverted_index.cybersecurity | 44 |
| abstract_inverted_index.proliferation | 1 |
| abstract_inverted_index.verification. | 176 |
| abstract_inverted_index.authentication | 47, 81 |
| abstract_inverted_index.identity-based | 55, 90 |
| abstract_inverted_index.authentication, | 53, 56 |
| abstract_inverted_index.authentication. | 112 |
| abstract_inverted_index.blockchain-enabled | 80 |
| abstract_inverted_index.cellular-connected | 87 |
| abstract_inverted_index.infrastructure-based | 52 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile |