{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:09:45Z","timestamp":1725235785575},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"18","license":[{"start":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:00:00Z","timestamp":1726358400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:00:00Z","timestamp":1726358400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:00:00Z","timestamp":1726358400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Sichuan Science and Technology Program","award":["2023YFG0031","2023YFG0112"]},{"name":"Pengcheng Shangxue Education Fund of Sichuan University","award":["0030406107010"]},{"name":"Cooperative Program of Sichuan University and Zigong","award":["2022CDZG-6"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,9,15]]},"DOI":"10.1109\/jiot.2024.3413010","type":"journal-article","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T18:24:49Z","timestamp":1718648689000},"page":"30187-30203","source":"Crossref","is-referenced-by-count":0,"title":["An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7638-1901","authenticated-orcid":false,"given":"Zhishuo","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Ying","family":"Huang","sequence":"additional","affiliation":[{"name":"West China Hospital, Sichuan University, Chengdu, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7682-4354","authenticated-orcid":false,"given":"Wen","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Computer Science, West China Hospital, Sichuan University, Chengdu, China"}]},{"given":"Wenbo","family":"Pan","sequence":"additional","affiliation":[{"name":"Center for Industrial and Business Organization, Dongbei University of Finance and Economics, Dalian, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3139-8528","authenticated-orcid":false,"given":"Yongjian","family":"Liao","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8314-754X","authenticated-orcid":false,"given":"Shijie","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3290508"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2023.3306151"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICARSC58346.2023.10129575"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100552"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600073WC"},{"key":"ref6","article-title":"A survey on cryptographic methods to secure communications for UAV traffic management","volume":"44","author":"Aissaoui","year":"2023","journal-title":"Veh. Commun."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101955"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3188769"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3163367"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2888821"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3129913"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084946"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2896064"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3203991"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2991174"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2440658"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2602282"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3219233"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3198045"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2024.3375758"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107999"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102821"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3349005"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3272772"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3241882"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACIE51979.2021.9381081"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3119517"},{"article-title":"On TLS for the Internet of Things, in a post quantum world","year":"2023","author":"Scott","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28073-3_55"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-40003-2_22"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_28"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0011-9"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"journal-title":"SafeCurves: Choosing safe curves for elliptic-curve cryptography","year":"2017","author":"Bernstein","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/sec.977"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3028872"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100679","article-title":"A key-insulated secure multi-server authenticated key agreement protocol for edge computing-based VANETs","volume":"21","author":"Yao","year":"2023","journal-title":"Internet Things"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3268699"},{"year":"2020","key":"ref42","article-title":"Cryptographic mechanisms: Recommendations and key lengths"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3207324"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10660568\/10559214.pdf?arnumber=10559214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T04:33:57Z","timestamp":1725165237000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10559214\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,15]]},"references-count":43,"journal-issue":{"issue":"18"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3413010","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2024,9,15]]}}}