Proceedings of International Conference on Applied Innovation in IT
2025/12/22, Volume 13, Issue 5, pp.747-755
AeroProof: Decentralized Mutual Authentication for UAV Swarm Networks
Hayder Ali Hameed, Hussein Ahmed Ali, Wasnaa Kadhim Jawad, Varun Shukla, Zainab Marid Alzamili and Mahmood A. Al-Shareeda Abstract: This paper thus addresses a problem with pressing consequences: the rise of Unmanned Aerial Vehicle (UAV) swarms in mission-critical and infrastructure-less environments is demanding secure, scalable, and decentralized authentication. Current protocols heavily lean on centralized trust models or having static credentials, neither of which is fit for highly mobile & P2P UAV networks. AeroProof is presented, a lightweight and decentralized mutual authentication protocol based on mobility-aware ephemeral keys. Each UAV autonomously produces secure elliptic curve credentials from its relatively short location, speed, and motion orientation (a single flight only), leading to a unique 'motion ticket'. The credentials are afterwards employed for a mutual authentication at the application level that provides strong security properties such as forward secrecy, session unlinkability, immunity against impersonation, replay, and wormhole attacks without requiring long-term identities or certificate authorities. We show that AeroProof achieves an up to 64% faster authentication time, a 35% less communication overhead, and consumes over 50% less memory compared with recent ECC- and blockchain-based solutions. This work has demonstrated the practical usefulness of AeroProof as an authentic framework to enable secure and efficient decentralized swarm operations.
Keywords: UAV Authentication, Decentralized Security, Ephemeral Keys, Swarm Communication, Mobility-Aware Cryptography, Elliptic Curve Cryptography (ECC).
DOI: Under indexing
Download: PDF
References:
- J. Sun, G. Yuan, L. Song, and H. Zhang, “Unmanned aerial vehicles (UAVs) in landslide investigation and monitoring: A review,” Drones, 2024.
- M. A. Al-Shareeda, T. Gaber, M. A. Alqarni, M. H. Alkinani, A. A. Almazroey, and A. A. Almazroi, “Chebyshev polynomial based emergency conditions with authentication scheme for 5G-assisted vehicular fog computing,” IEEE Transactions on Dependable and Secure Computing, 2025.
- K. Telli, O. Kraa, Y. Himeur, A. Ouamane, M. Boumehraz, S. Atalla, and W. Mansoor, “A comprehensive review of recent research trends on unmanned aerial vehicles (UAVs),” Systems, vol. 11, p. 400, 2023.
- M. R. Jones, S. Djahel, and K. Welsh, “Path-planning for unmanned aerial vehicles with environment complexity considerations: A survey,” ACM Computing Surveys, vol. 55, pp. 1-39, 2023.
- S. A. H. Mohsan, N. Q. H. Othman, Y. Li, M. H. Alsharif, and M. A. Khan, “Unmanned aerial vehicles (UAVs): Practical aspects, applications, open challenges, security issues, and future trends,” Intelligent Service Robotics, vol. 16, pp. 109-137, 2023.
- Z. Ning, H. Hu, X. Wang, L. Guo, S. Guo, G. Wang, and X. Gao, “Mobile edge computing and machine learning in the Internet of unmanned aerial vehicles: A survey,” ACM Computing Surveys, vol. 56, pp. 1-31, 2023.
- L. Xing and B. W. Johnson, “Reliability theory and practice for unmanned aerial vehicles,” IEEE Internet of Things Journal, vol. 10, pp. 3548-3566, 2023.
- Y. Renu and V. Sarveshwaran, “A review of cyber security challenges and solutions in unmanned aerial vehicles (UAVs),” Inteligencia Artificial, vol. 28, pp. 199-219, 2025.
- D. Wang, Y. Cao, K.-Y. Lam, Y. Hu, and O. Kaiwartya, “Authentication and key agreement based on three factors and PUF for UAV-assisted post-disaster emergency communication,” IEEE Internet of Things Journal, vol. 11, pp. 20457-20472, 2024.
- G. Bansal and B. K. Sikdar, “A secure and efficient mutual authentication protocol framework for unmanned aerial vehicles,” in 2021 IEEE Globecom Workshops (GC Wkshps), pp. 1-6, 2021.
- O. Albahri, A. Zaidan, A. Albahri, B. Zaidan, K. H. Abdulkareem, Z. Al-Qaysi, A. Alamoodi, A. Aleesa, M. Chyad, and R. Alesa, “Systematic review of artificial intelligence techniques in the detection and classification of COVID-19 medical images in terms of evaluation and benchmarking: Taxonomy analysis, challenges, future solutions and methodological aspects,” Journal of Infection and Public Health, vol. 13, no. 10, pp. 1381-1396, 2020.
- “Survey of UAV security authentication and cryptography protocols,” Iraqi Journal of Computers, Communications, Control and Systems Engineering, 2024.
- Z. G. Al-Mekhlaf, M. A. Saare, J. M. H. Altmemi, B. A. Mohammed, G. Alshammari, Y. A. Alkhabra, and I. Alreshidi, “A quantum-resilient lattice-based security framework for Internet of Medical Things in healthcare systems,” Journal of King Saud University Computer and Information Sciences, vol. 37, no. 6, pp. 1-19, 2025.
- A. Alamoodi, B. Zaidan, A. Zaidan, O. Albahri, J. Chen, M. Chyad, S. Garfan, and A. Aleesa, “Machine learning-based imputation soft computing approach for large missing scale and non-reference data imputation,” Chaos, Solitons & Fractals, vol. 151, p. 111236, 2021.
- M. A. Al-Shareeda, A. A. H. Ghadban, A. A. H. Glass, E. M. A. Hadi, and M. A. Almaiah, “Efficient implementation of post-quantum digital signatures on Raspberry Pi,” Discover Applied Sciences, vol. 7, no. 6, p. 597, 2025.
- U. C. Çabuk, G. Dalkılıç, and O. Dagdeviren, “COMAD: Context-aware mutual authentication protocol for drone networks,” IEEE Access, vol. 9, pp. 78400-78414, 2021.
- A. D. Algarni, N. Innab, and F. Algarni, “A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones,” PLOS ONE, vol. 20, no. 3, p. e0314475, 2025.
- R. Karmakar, G. Kaddoum, and O. Akhrif, “A blockchain-based distributed and intelligent clustering-enabled authentication protocol for UAV swarms,” IEEE Transactions on Mobile Computing, vol. 23, pp. 6178-6195, 2024.
- M. A. El-Zawawy, A. Brighente, and M. Conti, “SETCAP: Service-based energy-efficient temporal credential authentication protocol for Internet of Drones,” Computer Networks, vol. 206, p. 108804, 2022.
- N. Constantinescu, O. A. Ticleanu, and I. D. Hunyadi, “Securing authentication and detecting malicious entities in drone missions,” Drones, 2024.
|

HOME

- Conference
- Journal
- Paper Submission to Conference
- Paper Submission to Journal
- Fee Payment
- For Authors
- For Reviewers
- Important Dates
- Conference Committee
- Editorial Board
- Reviewers
- Last Proceeding

PROCEEDINGS
-
Volume 13, Issue 5 (ICAIIT 2025)
-
Volume 13, Issue 4 (ICAIIT 2025)
-
Volume 13, Issue 3 (ICAIIT 2025)
-
Volume 13, Issue 2 (ICAIIT 2025)
-
Volume 13, Issue 1 (ICAIIT 2025)
-
Volume 12, Issue 2 (ICAIIT 2024)
-
Volume 12, Issue 1 (ICAIIT 2024)
-
Volume 11, Issue 2 (ICAIIT 2023)
-
Volume 11, Issue 1 (ICAIIT 2023)
-
Volume 10, Issue 1 (ICAIIT 2022)
-
Volume 9, Issue 1 (ICAIIT 2021)
-
Volume 8, Issue 1 (ICAIIT 2020)
-
Volume 7, Issue 1 (ICAIIT 2019)
-
Volume 7, Issue 2 (ICAIIT 2019)
-
Volume 6, Issue 1 (ICAIIT 2018)
-
Volume 5, Issue 1 (ICAIIT 2017)
-
Volume 4, Issue 1 (ICAIIT 2016)
-
Volume 3, Issue 1 (ICAIIT 2015)
-
Volume 2, Issue 1 (ICAIIT 2014)
-
Volume 1, Issue 1 (ICAIIT 2013)

LAST CONFERENCE
ICAIIT 2026
-
Photos
-
Reports
PAST CONFERENCES
ETHICS IN PUBLICATIONS
ACCOMODATION
CONTACT US
|
|