Dual-Chain-Based Dynamic Authentication and Handover Mechanism for Air Command Aircraft in Multi-UAV Clusters
שמור ב:
| הוצא לאור ב: | Mathematics vol. 13, no. 13 (2025), p. 2130-2154 |
|---|---|
| מחבר ראשי: | |
| מחברים אחרים: | , , , , |
| יצא לאור: |
MDPI AG
|
| נושאים: | |
| גישה מקוונת: | Citation/Abstract Full Text + Graphics Full Text - PDF |
| תגים: |
אין תגיות, היה/י הראשונ/ה לתייג את הרשומה!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3229153618 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 2227-7390 | ||
| 024 | 7 | |a 10.3390/math13132130 |2 doi | |
| 035 | |a 3229153618 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 231533 |2 nlm | ||
| 100 | 1 | |a Ma, Jing |u School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China; majing@xatu.edu.cn (J.M.); chenyuanbo@st.xatu.edu.cn (Y.C.); duzhiqiang@xatu.edu.cn (Z.D.); yanxiaoge@xatu.edu.cn (X.Y.) | |
| 245 | 1 | |a Dual-Chain-Based Dynamic Authentication and Handover Mechanism for Air Command Aircraft in Multi-UAV Clusters | |
| 260 | |b MDPI AG |c 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a Cooperative multi-UAV clusters have been widely applied in complex mission scenarios due to their flexible task allocation and efficient real-time coordination capabilities. The Air Command Aircraft (ACA), as the core node within the UAV cluster, is responsible for coordinating and managing various tasks within the cluster. When the ACA undergoes fault recovery, a handover operation is required, during which the ACA must re-authenticate its identity with the UAV cluster and re-establish secure communication. However, traditional, centralized identity authentication and ACA handover mechanisms face security risks such as single points of failure and man-in-the-middle attacks. In highly dynamic network environments, single-chain blockchain architectures also suffer from throughput bottlenecks, leading to reduced handover efficiency and increased authentication latency. To address these challenges, this paper proposes a mathematically structured dual-chain framework that utilizes a distributed ledger to decouple the management of identity and authentication information. We formalize the ACA handover process using cryptographic primitives and accumulator functions and validate its security through BAN logic. Furthermore, we conduct quantitative analyses of key performance metrics, including time complexity and communication overhead. The experimental results demonstrate that the proposed approach ensures secure handover while significantly reducing computational burden. The framework also exhibits strong scalability, making it well-suited for large-scale UAV cluster networks. | |
| 653 | |a Aircraft | ||
| 653 | |a Agreements | ||
| 653 | |a Bans | ||
| 653 | |a Performance measurement | ||
| 653 | |a Collaboration | ||
| 653 | |a Satellite communications | ||
| 653 | |a Security | ||
| 653 | |a Authentication protocols | ||
| 653 | |a Distributed ledger | ||
| 653 | |a Unmanned aerial vehicles | ||
| 653 | |a Public Key Infrastructure | ||
| 653 | |a Network latency | ||
| 653 | |a Blockchain | ||
| 653 | |a Cryptography | ||
| 653 | |a Complexity | ||
| 653 | |a Clusters | ||
| 653 | |a Real time | ||
| 653 | |a Authentication | ||
| 653 | |a Smart contracts | ||
| 653 | |a Efficiency | ||
| 700 | 1 | |a Chen, Yuanbo |u School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China; majing@xatu.edu.cn (J.M.); chenyuanbo@st.xatu.edu.cn (Y.C.); duzhiqiang@xatu.edu.cn (Z.D.); yanxiaoge@xatu.edu.cn (X.Y.) | |
| 700 | 1 | |a Fu Yanfang |u School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China; majing@xatu.edu.cn (J.M.); chenyuanbo@st.xatu.edu.cn (Y.C.); duzhiqiang@xatu.edu.cn (Z.D.); yanxiaoge@xatu.edu.cn (X.Y.) | |
| 700 | 1 | |a Du, Zhiqiang |u School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China; majing@xatu.edu.cn (J.M.); chenyuanbo@st.xatu.edu.cn (Y.C.); duzhiqiang@xatu.edu.cn (Z.D.); yanxiaoge@xatu.edu.cn (X.Y.) | |
| 700 | 1 | |a Xiaoge, Yan |u School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China; majing@xatu.edu.cn (J.M.); chenyuanbo@st.xatu.edu.cn (Y.C.); duzhiqiang@xatu.edu.cn (Z.D.); yanxiaoge@xatu.edu.cn (X.Y.) | |
| 700 | 1 | |a Guochuang, Yan |u China Ordnance Industry Testing and Research Institute, Weinan 714200, China; 13892557252@163.com | |
| 773 | 0 | |t Mathematics |g vol. 13, no. 13 (2025), p. 2130-2154 | |
| 786 | 0 | |d ProQuest |t Engineering Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3229153618/abstract/embedded/IZYTEZ3DIR4FRXA2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text + Graphics |u https://www.proquest.com/docview/3229153618/fulltextwithgraphics/embedded/IZYTEZ3DIR4FRXA2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3229153618/fulltextPDF/embedded/IZYTEZ3DIR4FRXA2?source=fedsrch |