Dual-Chain-Based Dynamic Authentication and Handover Mechanism for Air Command Aircraft in Multi-UAV Clusters

שמור ב:
מידע ביבליוגרפי
הוצא לאור ב:Mathematics vol. 13, no. 13 (2025), p. 2130-2154
מחבר ראשי: Ma, Jing
מחברים אחרים: Chen, Yuanbo, Fu Yanfang, Du, Zhiqiang, Xiaoge, Yan, Guochuang, Yan
יצא לאור:
MDPI AG
נושאים:
גישה מקוונת:Citation/Abstract
Full Text + Graphics
Full Text - PDF
תגים: הוספת תג
אין תגיות, היה/י הראשונ/ה לתייג את הרשומה!

MARC

LEADER 00000nab a2200000uu 4500
001 3229153618
003 UK-CbPIL
022 |a 2227-7390 
024 7 |a 10.3390/math13132130  |2 doi 
035 |a 3229153618 
045 2 |b d20250101  |b d20251231 
084 |a 231533  |2 nlm 
100 1 |a Ma, Jing  |u School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China; majing@xatu.edu.cn (J.M.); chenyuanbo@st.xatu.edu.cn (Y.C.); duzhiqiang@xatu.edu.cn (Z.D.); yanxiaoge@xatu.edu.cn (X.Y.) 
245 1 |a Dual-Chain-Based Dynamic Authentication and Handover Mechanism for Air Command Aircraft in Multi-UAV Clusters 
260 |b MDPI AG  |c 2025 
513 |a Journal Article 
520 3 |a Cooperative multi-UAV clusters have been widely applied in complex mission scenarios due to their flexible task allocation and efficient real-time coordination capabilities. The Air Command Aircraft (ACA), as the core node within the UAV cluster, is responsible for coordinating and managing various tasks within the cluster. When the ACA undergoes fault recovery, a handover operation is required, during which the ACA must re-authenticate its identity with the UAV cluster and re-establish secure communication. However, traditional, centralized identity authentication and ACA handover mechanisms face security risks such as single points of failure and man-in-the-middle attacks. In highly dynamic network environments, single-chain blockchain architectures also suffer from throughput bottlenecks, leading to reduced handover efficiency and increased authentication latency. To address these challenges, this paper proposes a mathematically structured dual-chain framework that utilizes a distributed ledger to decouple the management of identity and authentication information. We formalize the ACA handover process using cryptographic primitives and accumulator functions and validate its security through BAN logic. Furthermore, we conduct quantitative analyses of key performance metrics, including time complexity and communication overhead. The experimental results demonstrate that the proposed approach ensures secure handover while significantly reducing computational burden. The framework also exhibits strong scalability, making it well-suited for large-scale UAV cluster networks. 
653 |a Aircraft 
653 |a Agreements 
653 |a Bans 
653 |a Performance measurement 
653 |a Collaboration 
653 |a Satellite communications 
653 |a Security 
653 |a Authentication protocols 
653 |a Distributed ledger 
653 |a Unmanned aerial vehicles 
653 |a Public Key Infrastructure 
653 |a Network latency 
653 |a Blockchain 
653 |a Cryptography 
653 |a Complexity 
653 |a Clusters 
653 |a Real time 
653 |a Authentication 
653 |a Smart contracts 
653 |a Efficiency 
700 1 |a Chen, Yuanbo  |u School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China; majing@xatu.edu.cn (J.M.); chenyuanbo@st.xatu.edu.cn (Y.C.); duzhiqiang@xatu.edu.cn (Z.D.); yanxiaoge@xatu.edu.cn (X.Y.) 
700 1 |a Fu Yanfang  |u School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China; majing@xatu.edu.cn (J.M.); chenyuanbo@st.xatu.edu.cn (Y.C.); duzhiqiang@xatu.edu.cn (Z.D.); yanxiaoge@xatu.edu.cn (X.Y.) 
700 1 |a Du, Zhiqiang  |u School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China; majing@xatu.edu.cn (J.M.); chenyuanbo@st.xatu.edu.cn (Y.C.); duzhiqiang@xatu.edu.cn (Z.D.); yanxiaoge@xatu.edu.cn (X.Y.) 
700 1 |a Xiaoge, Yan  |u School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China; majing@xatu.edu.cn (J.M.); chenyuanbo@st.xatu.edu.cn (Y.C.); duzhiqiang@xatu.edu.cn (Z.D.); yanxiaoge@xatu.edu.cn (X.Y.) 
700 1 |a Guochuang, Yan  |u China Ordnance Industry Testing and Research Institute, Weinan 714200, China; 13892557252@163.com 
773 0 |t Mathematics  |g vol. 13, no. 13 (2025), p. 2130-2154 
786 0 |d ProQuest  |t Engineering Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3229153618/abstract/embedded/IZYTEZ3DIR4FRXA2?source=fedsrch 
856 4 0 |3 Full Text + Graphics  |u https://www.proquest.com/docview/3229153618/fulltextwithgraphics/embedded/IZYTEZ3DIR4FRXA2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3229153618/fulltextPDF/embedded/IZYTEZ3DIR4FRXA2?source=fedsrch