Reactive Handover Coordination System with Regenerative Blockchain Principles for Swarm Unmanned Aerial Vehicles Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.21203/rs.3.rs-3132087/v1
Aerial warfare systems in various countries highly expect Swarm Unmanned Aerial Vehicles (UAVs) and Flying Adhoc Networks (FANETs) for defense stability. However, swarm UAVs face many challenges, like security breaches, malfunctions, link failures, and handover failures. UAVs can easily malfunction by external threats to create data loss, theft, signal jamming, misrouting, false handover, and location spoofing. Failures in UAV handover principles make overall gradual downtime in FANET. Against these issues, existing UAV protection mechanisms deliver location monitoring mechanisms (graphs and trees), multi-link handover mechanisms, and distributed authentication principles. Anyhow, the implantation of recent-day techniques may fail against migrating attacker events executed in electronic warfare systems. The methods need improvements in protecting Multi-UAV layers through end-to-end security principles. On the research problem, the proposed Reactive Handover Coordination System with Regenerative Blockchain Principles (RHCRB) takes novel high-security features specially made for swarm UAVs. RHCRB implements more crucial distributed functions in each UAV on demand. The executed operations of RHCRB comprise trusted location monitoring schemes (internal and cooperative UAV movements), dynamic location-based cost magnitude calculations, regenerative blockchain principles (authentication of each UAV and active edges), confidential link management principles, secure handover coordination, and on-demand topology management principles. The technical aspects of RHCRB build lightweight and shielded handover principles against airfield vulnerabilities. The proposed model suggests implementing an entirely protected handover environment from node localization to handover events. The inspired technical aspects of RHCRB contribute to the swarm UAV environment through confidential (Advanced Encryption Standard (AES)) and distributed authentication (blockchain-based node and edge management) principles to engage protected handover practices. The experimental section of this article has the testbed in FlyNetSim tool for implementing RHCRB and notable recent security techniques such as the Internet of Vehicles with Decentralized Blockchains (IoV-DB), Group Handover for Internet of Defense (GH-IoD), and Handover and Optimized Security Principles for UAVs (HOOPOE). The results show RHCRB's 8–14% of betterment than existing techniques through various measures.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- https://doi.org/10.21203/rs.3.rs-3132087/v1
- https://www.researchsquare.com/article/rs-3132087/latest.pdf
- OA Status
- green
- Cited By
- 1
- References
- 20
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4383263312
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4383263312Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.21203/rs.3.rs-3132087/v1Digital Object Identifier
- Title
-
Reactive Handover Coordination System with Regenerative Blockchain Principles for Swarm Unmanned Aerial VehiclesWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-07-05Full publication date if available
- Authors
-
S. Rajasoundaran, S. V. N. Santhosh Kumar, M. Selvi, A. KannanList of authors in order
- Landing page
-
https://doi.org/10.21203/rs.3.rs-3132087/v1Publisher landing page
- PDF URL
-
https://www.researchsquare.com/article/rs-3132087/latest.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://www.researchsquare.com/article/rs-3132087/latest.pdfDirect OA link when available
- Concepts
-
Handover, Computer science, Swarm behaviour, Authentication (law), Computer security, Computer network, Artificial intelligenceTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1Per-year citation counts (last 5 years)
- References (count)
-
20Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4383263312 |
|---|---|
| doi | https://doi.org/10.21203/rs.3.rs-3132087/v1 |
| ids.doi | https://doi.org/10.21203/rs.3.rs-3132087/v1 |
| ids.openalex | https://openalex.org/W4383263312 |
| fwci | 0.51995027 |
| type | preprint |
| title | Reactive Handover Coordination System with Regenerative Blockchain Principles for Swarm Unmanned Aerial Vehicles |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11133 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2202 |
| topics[0].subfield.display_name | Aerospace Engineering |
| topics[0].display_name | UAV Applications and Optimization |
| topics[1].id | https://openalex.org/T10249 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9803000092506409 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Distributed Control Multi-Agent Systems |
| topics[2].id | https://openalex.org/T10270 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9789000153541565 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Blockchain Technology Applications and Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C111852164 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6876494288444519 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q1414679 |
| concepts[0].display_name | Handover |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6538792848587036 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C181335050 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5216636657714844 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q14915018 |
| concepts[2].display_name | Swarm behaviour |
| concepts[3].id | https://openalex.org/C148417208 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5200592875480652 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[3].display_name | Authentication (law) |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.44142258167266846 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C31258907 |
| concepts[5].level | 1 |
| concepts[5].score | 0.4222891926765442 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[5].display_name | Computer network |
| concepts[6].id | https://openalex.org/C154945302 |
| concepts[6].level | 1 |
| concepts[6].score | 0.0 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[6].display_name | Artificial intelligence |
| keywords[0].id | https://openalex.org/keywords/handover |
| keywords[0].score | 0.6876494288444519 |
| keywords[0].display_name | Handover |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.6538792848587036 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/swarm-behaviour |
| keywords[2].score | 0.5216636657714844 |
| keywords[2].display_name | Swarm behaviour |
| keywords[3].id | https://openalex.org/keywords/authentication |
| keywords[3].score | 0.5200592875480652 |
| keywords[3].display_name | Authentication (law) |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.44142258167266846 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/computer-network |
| keywords[5].score | 0.4222891926765442 |
| keywords[5].display_name | Computer network |
| language | en |
| locations[0].id | doi:10.21203/rs.3.rs-3132087/v1 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306402450 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Research Square (Research Square) |
| locations[0].source.host_organization | https://openalex.org/I4210096694 |
| locations[0].source.host_organization_name | Research Square (United States) |
| locations[0].source.host_organization_lineage | https://openalex.org/I4210096694 |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.researchsquare.com/article/rs-3132087/latest.pdf |
| locations[0].version | acceptedVersion |
| locations[0].raw_type | posted-content |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.21203/rs.3.rs-3132087/v1 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5076494161 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | S. Rajasoundaran |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I145286018 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Networking and Communications, SRM Institute of Science and Technology, Kattankulathur, India; |
| authorships[0].institutions[0].id | https://openalex.org/I145286018 |
| authorships[0].institutions[0].ror | https://ror.org/050113w36 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I145286018 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | SRM Institute of Science and Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | S. Rajasoundaran |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Networking and Communications, SRM Institute of Science and Technology, Kattankulathur, India; |
| authorships[1].author.id | https://openalex.org/A5104024279 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | S. V. N. Santhosh Kumar |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I876193797 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India; |
| authorships[1].institutions[0].id | https://openalex.org/I876193797 |
| authorships[1].institutions[0].ror | https://ror.org/00qzypv28 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I876193797 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Vellore Institute of Technology University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | S. V.N. Santhosh Kumar |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India; |
| authorships[2].author.id | https://openalex.org/A5008316069 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | M. Selvi |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I876193797 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India; |
| authorships[2].institutions[0].id | https://openalex.org/I876193797 |
| authorships[2].institutions[0].ror | https://ror.org/00qzypv28 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I876193797 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Vellore Institute of Technology University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Selvi M |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India; |
| authorships[3].author.id | https://openalex.org/A5017525339 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-3564-395X |
| authorships[3].author.display_name | A. Kannan |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I876193797 |
| authorships[3].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India; |
| authorships[3].institutions[0].id | https://openalex.org/I876193797 |
| authorships[3].institutions[0].ror | https://ror.org/00qzypv28 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I876193797 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Vellore Institute of Technology University |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Arputharaj Kannan |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India; |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.researchsquare.com/article/rs-3132087/latest.pdf |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Reactive Handover Coordination System with Regenerative Blockchain Principles for Swarm Unmanned Aerial Vehicles |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11133 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2202 |
| primary_topic.subfield.display_name | Aerospace Engineering |
| primary_topic.display_name | UAV Applications and Optimization |
| related_works | https://openalex.org/W2520149731, https://openalex.org/W1981519115, https://openalex.org/W3006634511, https://openalex.org/W1985631144, https://openalex.org/W2736680465, https://openalex.org/W4288714711, https://openalex.org/W2087123996, https://openalex.org/W2103264866, https://openalex.org/W2384086787, https://openalex.org/W2912135041 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.21203/rs.3.rs-3132087/v1 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306402450 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Research Square (Research Square) |
| best_oa_location.source.host_organization | https://openalex.org/I4210096694 |
| best_oa_location.source.host_organization_name | Research Square (United States) |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I4210096694 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.researchsquare.com/article/rs-3132087/latest.pdf |
| best_oa_location.version | acceptedVersion |
| best_oa_location.raw_type | posted-content |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.21203/rs.3.rs-3132087/v1 |
| primary_location.id | doi:10.21203/rs.3.rs-3132087/v1 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306402450 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Research Square (Research Square) |
| primary_location.source.host_organization | https://openalex.org/I4210096694 |
| primary_location.source.host_organization_name | Research Square (United States) |
| primary_location.source.host_organization_lineage | https://openalex.org/I4210096694 |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.researchsquare.com/article/rs-3132087/latest.pdf |
| primary_location.version | acceptedVersion |
| primary_location.raw_type | posted-content |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.21203/rs.3.rs-3132087/v1 |
| publication_date | 2023-07-05 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W4364377881, https://openalex.org/W4322501864, https://openalex.org/W4319878675, https://openalex.org/W4205705974, https://openalex.org/W3212407545, https://openalex.org/W4280507864, https://openalex.org/W4210758127, https://openalex.org/W4214660852, https://openalex.org/W2999989552, https://openalex.org/W4366310754, https://openalex.org/W4360995450, https://openalex.org/W4313260609, https://openalex.org/W2968773007, https://openalex.org/W4366957204, https://openalex.org/W4313399985, https://openalex.org/W4295346239, https://openalex.org/W4367359630, https://openalex.org/W4321324682, https://openalex.org/W4220741079, https://openalex.org/W4283803271 |
| referenced_works_count | 20 |
| abstract_inverted_index.On | 118 |
| abstract_inverted_index.an | 214 |
| abstract_inverted_index.as | 278 |
| abstract_inverted_index.by | 41 |
| abstract_inverted_index.in | 4, 58, 66, 102, 110, 148, 266 |
| abstract_inverted_index.of | 92, 156, 177, 198, 229, 260, 281, 291, 308 |
| abstract_inverted_index.on | 151 |
| abstract_inverted_index.to | 44, 222, 232, 252 |
| abstract_inverted_index.The | 106, 153, 195, 209, 225, 257, 303 |
| abstract_inverted_index.UAV | 59, 72, 150, 166, 179, 235 |
| abstract_inverted_index.and | 14, 34, 54, 80, 85, 164, 180, 190, 202, 243, 248, 272, 294, 296 |
| abstract_inverted_index.can | 38 |
| abstract_inverted_index.for | 19, 139, 269, 289, 300 |
| abstract_inverted_index.has | 263 |
| abstract_inverted_index.may | 95 |
| abstract_inverted_index.the | 90, 119, 122, 233, 264, 279 |
| abstract_inverted_index.UAVs | 24, 37, 301 |
| abstract_inverted_index.cost | 170 |
| abstract_inverted_index.data | 46 |
| abstract_inverted_index.each | 149, 178 |
| abstract_inverted_index.edge | 249 |
| abstract_inverted_index.face | 25 |
| abstract_inverted_index.fail | 96 |
| abstract_inverted_index.from | 219 |
| abstract_inverted_index.like | 28 |
| abstract_inverted_index.link | 32, 184 |
| abstract_inverted_index.made | 138 |
| abstract_inverted_index.make | 62 |
| abstract_inverted_index.many | 26 |
| abstract_inverted_index.more | 144 |
| abstract_inverted_index.need | 108 |
| abstract_inverted_index.node | 220, 247 |
| abstract_inverted_index.show | 305 |
| abstract_inverted_index.such | 277 |
| abstract_inverted_index.than | 310 |
| abstract_inverted_index.this | 261 |
| abstract_inverted_index.tool | 268 |
| abstract_inverted_index.with | 128, 283 |
| abstract_inverted_index.Adhoc | 16 |
| abstract_inverted_index.Group | 287 |
| abstract_inverted_index.RHCRB | 142, 157, 199, 230, 271 |
| abstract_inverted_index.Swarm | 9 |
| abstract_inverted_index.UAVs. | 141 |
| abstract_inverted_index.build | 200 |
| abstract_inverted_index.false | 52 |
| abstract_inverted_index.loss, | 47 |
| abstract_inverted_index.model | 211 |
| abstract_inverted_index.novel | 134 |
| abstract_inverted_index.swarm | 23, 140, 234 |
| abstract_inverted_index.takes | 133 |
| abstract_inverted_index.these | 69 |
| abstract_inverted_index.(AES)) | 242 |
| abstract_inverted_index.(UAVs) | 13 |
| abstract_inverted_index.Aerial | 1, 11 |
| abstract_inverted_index.FANET. | 67 |
| abstract_inverted_index.Flying | 15 |
| abstract_inverted_index.System | 127 |
| abstract_inverted_index.active | 181 |
| abstract_inverted_index.create | 45 |
| abstract_inverted_index.easily | 39 |
| abstract_inverted_index.engage | 253 |
| abstract_inverted_index.events | 100 |
| abstract_inverted_index.expect | 8 |
| abstract_inverted_index.highly | 7 |
| abstract_inverted_index.layers | 113 |
| abstract_inverted_index.recent | 274 |
| abstract_inverted_index.secure | 187 |
| abstract_inverted_index.signal | 49 |
| abstract_inverted_index.theft, | 48 |
| abstract_inverted_index.(RHCRB) | 132 |
| abstract_inverted_index.(graphs | 79 |
| abstract_inverted_index.8–14% | 307 |
| abstract_inverted_index.Against | 68 |
| abstract_inverted_index.Anyhow, | 89 |
| abstract_inverted_index.Defense | 292 |
| abstract_inverted_index.RHCRB's | 306 |
| abstract_inverted_index.against | 97, 206 |
| abstract_inverted_index.article | 262 |
| abstract_inverted_index.aspects | 197, 228 |
| abstract_inverted_index.crucial | 145 |
| abstract_inverted_index.defense | 20 |
| abstract_inverted_index.deliver | 75 |
| abstract_inverted_index.demand. | 152 |
| abstract_inverted_index.dynamic | 168 |
| abstract_inverted_index.edges), | 182 |
| abstract_inverted_index.events. | 224 |
| abstract_inverted_index.gradual | 64 |
| abstract_inverted_index.issues, | 70 |
| abstract_inverted_index.methods | 107 |
| abstract_inverted_index.notable | 273 |
| abstract_inverted_index.overall | 63 |
| abstract_inverted_index.results | 304 |
| abstract_inverted_index.schemes | 162 |
| abstract_inverted_index.section | 259 |
| abstract_inverted_index.systems | 3 |
| abstract_inverted_index.testbed | 265 |
| abstract_inverted_index.threats | 43 |
| abstract_inverted_index.through | 114, 237, 313 |
| abstract_inverted_index.trees), | 81 |
| abstract_inverted_index.trusted | 159 |
| abstract_inverted_index.various | 5, 314 |
| abstract_inverted_index.warfare | 2, 104 |
| abstract_inverted_index.(FANETs) | 18 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.Failures | 57 |
| abstract_inverted_index.Handover | 125, 288, 295 |
| abstract_inverted_index.However, | 22 |
| abstract_inverted_index.Internet | 280, 290 |
| abstract_inverted_index.Networks | 17 |
| abstract_inverted_index.Reactive | 124 |
| abstract_inverted_index.Security | 298 |
| abstract_inverted_index.Standard | 241 |
| abstract_inverted_index.Unmanned | 10 |
| abstract_inverted_index.Vehicles | 12, 282 |
| abstract_inverted_index.airfield | 207 |
| abstract_inverted_index.attacker | 99 |
| abstract_inverted_index.comprise | 158 |
| abstract_inverted_index.downtime | 65 |
| abstract_inverted_index.entirely | 215 |
| abstract_inverted_index.executed | 101, 154 |
| abstract_inverted_index.existing | 71, 311 |
| abstract_inverted_index.external | 42 |
| abstract_inverted_index.features | 136 |
| abstract_inverted_index.handover | 35, 60, 83, 188, 204, 217, 223, 255 |
| abstract_inverted_index.inspired | 226 |
| abstract_inverted_index.jamming, | 50 |
| abstract_inverted_index.location | 55, 76, 160 |
| abstract_inverted_index.problem, | 121 |
| abstract_inverted_index.proposed | 123, 210 |
| abstract_inverted_index.research | 120 |
| abstract_inverted_index.security | 29, 116, 275 |
| abstract_inverted_index.shielded | 203 |
| abstract_inverted_index.suggests | 212 |
| abstract_inverted_index.systems. | 105 |
| abstract_inverted_index.topology | 192 |
| abstract_inverted_index.(Advanced | 239 |
| abstract_inverted_index.(GH-IoD), | 293 |
| abstract_inverted_index.(HOOPOE). | 302 |
| abstract_inverted_index.(IoV-DB), | 286 |
| abstract_inverted_index.(internal | 163 |
| abstract_inverted_index.FlyNetSim | 267 |
| abstract_inverted_index.Multi-UAV | 112 |
| abstract_inverted_index.Optimized | 297 |
| abstract_inverted_index.breaches, | 30 |
| abstract_inverted_index.countries | 6 |
| abstract_inverted_index.failures, | 33 |
| abstract_inverted_index.failures. | 36 |
| abstract_inverted_index.functions | 147 |
| abstract_inverted_index.handover, | 53 |
| abstract_inverted_index.magnitude | 171 |
| abstract_inverted_index.measures. | 315 |
| abstract_inverted_index.migrating | 98 |
| abstract_inverted_index.on-demand | 191 |
| abstract_inverted_index.protected | 216, 254 |
| abstract_inverted_index.specially | 137 |
| abstract_inverted_index.spoofing. | 56 |
| abstract_inverted_index.technical | 196, 227 |
| abstract_inverted_index.Blockchain | 130 |
| abstract_inverted_index.Encryption | 240 |
| abstract_inverted_index.Principles | 131, 299 |
| abstract_inverted_index.betterment | 309 |
| abstract_inverted_index.blockchain | 174 |
| abstract_inverted_index.contribute | 231 |
| abstract_inverted_index.electronic | 103 |
| abstract_inverted_index.end-to-end | 115 |
| abstract_inverted_index.implements | 143 |
| abstract_inverted_index.management | 185, 193 |
| abstract_inverted_index.mechanisms | 74, 78 |
| abstract_inverted_index.monitoring | 77, 161 |
| abstract_inverted_index.multi-link | 82 |
| abstract_inverted_index.operations | 155 |
| abstract_inverted_index.practices. | 256 |
| abstract_inverted_index.principles | 61, 175, 205, 251 |
| abstract_inverted_index.protecting | 111 |
| abstract_inverted_index.protection | 73 |
| abstract_inverted_index.recent-day | 93 |
| abstract_inverted_index.stability. | 21 |
| abstract_inverted_index.techniques | 94, 276, 312 |
| abstract_inverted_index.Blockchains | 285 |
| abstract_inverted_index.challenges, | 27 |
| abstract_inverted_index.cooperative | 165 |
| abstract_inverted_index.distributed | 86, 146, 244 |
| abstract_inverted_index.environment | 218, 236 |
| abstract_inverted_index.lightweight | 201 |
| abstract_inverted_index.malfunction | 40 |
| abstract_inverted_index.management) | 250 |
| abstract_inverted_index.mechanisms, | 84 |
| abstract_inverted_index.misrouting, | 51 |
| abstract_inverted_index.movements), | 167 |
| abstract_inverted_index.principles, | 186 |
| abstract_inverted_index.principles. | 88, 117, 194 |
| abstract_inverted_index.Coordination | 126 |
| abstract_inverted_index.Regenerative | 129 |
| abstract_inverted_index.confidential | 183, 238 |
| abstract_inverted_index.experimental | 258 |
| abstract_inverted_index.implantation | 91 |
| abstract_inverted_index.implementing | 213, 270 |
| abstract_inverted_index.improvements | 109 |
| abstract_inverted_index.localization | 221 |
| abstract_inverted_index.regenerative | 173 |
| abstract_inverted_index.Decentralized | 284 |
| abstract_inverted_index.calculations, | 172 |
| abstract_inverted_index.coordination, | 189 |
| abstract_inverted_index.high-security | 135 |
| abstract_inverted_index.malfunctions, | 31 |
| abstract_inverted_index.authentication | 87, 245 |
| abstract_inverted_index.location-based | 169 |
| abstract_inverted_index.(authentication | 176 |
| abstract_inverted_index.vulnerabilities. | 208 |
| abstract_inverted_index.(blockchain-based | 246 |
| cited_by_percentile_year.max | 95 |
| cited_by_percentile_year.min | 91 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.75449422 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |