10.25673/121713">


Proceedings of International Conference on Applied Innovation in IT
2025/08/29, Volume 13, Issue 4, pp.1-7

Bio-Authenticated ECC Framework for Secure Drone-to-Drone Communication in IoD Environments


Murtaja Ali Saare, Mohamed Abdulrahman Abdulhamed, Saad Abdulhussein Abbas, Aseel Jasim and Mahmood A. Al-Shareeda


Abstract: The Internet of Drones (IoD) has become a vital infrastructure to provide surveillance, transportation, and combat support, and therefore a compact, secure solution. This article introduces a new Bio-authenticated Elliptic Curve Cryptography Framework (ECC) that integrates biometric fuzzy extractors with ECC. The protocol removes the dependence on fixed credentials by binding authentication to unique biological features, thereby strengthening identity assurance and resistance to replay, impersonation, and stolen-verifier attacks. The process supports both sides achieving mutual authentication. Ephemeral session keys are generated without any Ground Control Station (GCS), thus providing some relief, although not enough as yet. Informal security analysis indicates that it can withstand commonly known threat vectors. Performance assessment reveals that the cost of communication and computation has been reduced by more than 28%, compared with existing ECC-based schemes. Cryptographic-biometric fusion substantially reduces storage overhead and raises resilience against insider threats as well. This privacy-preserving, lightweight protocol provides a secure solution scalable for real-world operations environments where computing resources are still very much lacking.

Keywords: Internet of Drones (IoD), Biometric Authentication, Elliptic Curve Cryptography (ECC), Lightweight Security, Mutual Authentication, Drone Communication, Cybersecurity in UAVs.

DOI: 10.25673/121713

Download: PDF

References:

  1. S. A. H. Mohsan, M. A. Khan, F. Noor, I. Ullah, and M. H. Alsharif, “Towards the unmanned aerial vehicles (UAVs): A comprehensive review,” Drones, vol. 6, no. 6, p. 147, 2022.
  2. A. K. Nanda, S. R. Marukanti, U. Harish, B. V. Dheeraj, B. S. Adoni, C. R. Reddy, and S. Nanda, “Evaluating lightweight asymmetric cryptography for secure communication in Internet of Drones,” in Proc. 2025 Fourth Int. Conf. Power, Control and Computing Technologies (ICPC2T), IEEE, 2025, pp. 875–879.
  3. K. Osmani and D. Schulz, “Comprehensive investigation of unmanned aerial vehicles (UAVs): An in-depth analysis of avionics systems,” Sensors, vol. 24, no. 10, p. 3064, 2024.
  4. J. Shan, W. Jiang, Y. Huang, D. Yuan, and Y. Liu, “Unmanned aerial vehicle (UAV)-based pavement image stitching without occlusion, crack semantic segmentation, and quantification,” IEEE Trans. Intell. Transp. Syst., 2024.
  5. Z. Ren, K. Hussain, M. Faheem, et al., “K-means online-learning routing protocol (K-MORP) for unmanned aerial vehicles (UAV) ad hoc networks,” Ad Hoc Networks, vol. 154, p. 103354, 2024.
  6. N. Alzahrani, “A verifiably secure and lightweight device-to-device (D2D) authentication protocol for resource-constrained IoT networks,” IEEE Access, 2025.
  7. Z. Zhang and Z. Shu, “Unmanned aerial vehicle (UAV)-assisted damage detection of wind turbine blades: A review,” Energies, vol. 17, no. 15, p. 3731, 2024.
  8. M. A. Al-Shareeda, T. Gaber, M. A. Alqarni, M. H. Alkinani, A. A. Almazroey, and A. A. Almazroi, “Chebyshev polynomial based emergency conditions with authentication scheme for 5G-assisted vehicular fog computing,” IEEE Trans. Dependable Secure Comput., 2025.
  9. J. Zhang, X. Chen, Q. Cheng, X. Chen, and X. Luo, “An enhanced certificateless blockchain-assisted authentication and key agreement protocol for Internet of Drones,” IEEE Trans. Netw. Sci. Eng., 2025.
  10. V. Jithu Vijay and S. M. Thampi, “Navigating the skies: Exploring dynamic access control in the Internet of Drones (IoD),” in Securing the Connected World: Exploring Emerging Threats and Innovative Solutions, Springer, 2025, pp. 345–380.
  11. M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “Unmanned aerial vehicle: A review and future directions,” Indonesian J. Electr. Eng. Comput. Sci., 2023.
  12. Z. Oudina, M. Derdour, A. Dib, and M. M. Bouhamed, “Empirical analysis of the security threats and risks that drones face, represent, and mitigation,” in Proc. 2024 6th Int. Conf. Pattern Anal. Intell. Syst. (PAIS), IEEE, 2024, pp. 1–8.
  13. O. Ceviz, S. Sen, and P. Sadioglu, “A survey of security in UAVs and FANETs: Issues, threats, analysis of attacks, and solutions,” IEEE Commun. Surveys Tuts., 2024.
  14. M. Kabi, N. Dayal, and P. Raikwal, “ECC-based lightweight authentication for resource-constrained devices leveraging the edge node,” IEEE Trans. Rel., 2025.
  15. S. M. Gilani, A. Anjum, A. Khan, M. H. Syed, S. A. Moqurrab, and G. Srivastava, “A robust Internet of Drones security surveillance communication network based on IOTA,” Internet of Things, vol. 25, p. 101066, 2024.
  16. I. Chandran and K. Vipin, “A PUF secured lightweight mutual authentication protocol for multi-UAV networks,” Comput. Networks, vol. 253, p. 110717, 2024.
  17. L. Zhang, J. Xu, M. S. Obaidat, X. Li, and P. Vijayakumar, “A PUF-based lightweight authentication and key agreement protocol for smart UAV networks,” IET Commun., vol. 16, no. 10, pp. 1142–1159, 2022.
  18. W. Wang, Z. Han, T. R. Gadekallu, S. Raza, J. Tanveer, and C. Su, “Lightweight blockchain-enhanced mutual authentication protocol for UAVs,” IEEE Internet Things J., vol. 11, no. 6, pp. 9547–9557, 2023.
  19. S. Zhang, Y. Liu, Z. Han, and Z. Yang, “A lightweight authentication protocol for UAVs based on ECC scheme,” Drones, vol. 7, no. 5, p. 315, 2023.
  20. S. Zhang, Z. Yan, W. Liang, K.-C. Li, and C. Dobre, “BAKA: Biometric authentication and key agreement scheme based on fuzzy extractor for wireless body area networks,” IEEE Internet Things J., vol. 11, no. 3, pp. 5118–5128, 2023.
  21. S. Ebrahimi and S. Bayat-Sarmadi, “Lightweight fuzzy extractor based on LPN for device and biometric authentication in IoT,” IEEE Internet Things J., vol. 8, no. 13, pp. 10706–10713, 2021.
  22. A. D. Algarni, N. Innab, and F. Algarni, “A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones,” PLoS One, vol. 20, no. 3, p. e0314475, 2025.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.