Proceedings of International Conference on Applied Innovation in IT
2025/12/22, Volume 13, Issue 5, pp.747-755

AeroProof: Decentralized Mutual Authentication for UAV Swarm Networks


Hayder Ali Hameed, Hussein Ahmed Ali, Wasnaa Kadhim Jawad, Varun Shukla, Zainab Marid Alzamili and Mahmood A. Al-Shareeda


Abstract: This paper thus addresses a problem with pressing consequences: the rise of Unmanned Aerial Vehicle (UAV) swarms in mission-critical and infrastructure-less environments is demanding secure, scalable, and decentralized authentication. Current protocols heavily lean on centralized trust models or having static credentials, neither of which is fit for highly mobile & P2P UAV networks. AeroProof is presented, a lightweight and decentralized mutual authentication protocol based on mobility-aware ephemeral keys. Each UAV autonomously produces secure elliptic curve credentials from its relatively short location, speed, and motion orientation (a single flight only), leading to a unique 'motion ticket'. The credentials are afterwards employed for a mutual authentication at the application level that provides strong security properties such as forward secrecy, session unlinkability, immunity against impersonation, replay, and wormhole attacks without requiring long-term identities or certificate authorities. We show that AeroProof achieves an up to 64% faster authentication time, a 35% less communication overhead, and consumes over 50% less memory compared with recent ECC- and blockchain-based solutions. This work has demonstrated the practical usefulness of AeroProof as an authentic framework to enable secure and efficient decentralized swarm operations.

Keywords: UAV Authentication, Decentralized Security, Ephemeral Keys, Swarm Communication, Mobility-Aware Cryptography, Elliptic Curve Cryptography (ECC).

DOI: Under indexing

Download: PDF

References:

  1. J. Sun, G. Yuan, L. Song, and H. Zhang, “Unmanned aerial vehicles (UAVs) in landslide investigation and monitoring: A review,” Drones, 2024.
  2. M. A. Al-Shareeda, T. Gaber, M. A. Alqarni, M. H. Alkinani, A. A. Almazroey, and A. A. Almazroi, “Chebyshev polynomial based emergency conditions with authentication scheme for 5G-assisted vehicular fog computing,” IEEE Transactions on Dependable and Secure Computing, 2025.
  3. K. Telli, O. Kraa, Y. Himeur, A. Ouamane, M. Boumehraz, S. Atalla, and W. Mansoor, “A comprehensive review of recent research trends on unmanned aerial vehicles (UAVs),” Systems, vol. 11, p. 400, 2023.
  4. M. R. Jones, S. Djahel, and K. Welsh, “Path-planning for unmanned aerial vehicles with environment complexity considerations: A survey,” ACM Computing Surveys, vol. 55, pp. 1-39, 2023.
  5. S. A. H. Mohsan, N. Q. H. Othman, Y. Li, M. H. Alsharif, and M. A. Khan, “Unmanned aerial vehicles (UAVs): Practical aspects, applications, open challenges, security issues, and future trends,” Intelligent Service Robotics, vol. 16, pp. 109-137, 2023.
  6. Z. Ning, H. Hu, X. Wang, L. Guo, S. Guo, G. Wang, and X. Gao, “Mobile edge computing and machine learning in the Internet of unmanned aerial vehicles: A survey,” ACM Computing Surveys, vol. 56, pp. 1-31, 2023.
  7. L. Xing and B. W. Johnson, “Reliability theory and practice for unmanned aerial vehicles,” IEEE Internet of Things Journal, vol. 10, pp. 3548-3566, 2023.
  8. Y. Renu and V. Sarveshwaran, “A review of cyber security challenges and solutions in unmanned aerial vehicles (UAVs),” Inteligencia Artificial, vol. 28, pp. 199-219, 2025.
  9. D. Wang, Y. Cao, K.-Y. Lam, Y. Hu, and O. Kaiwartya, “Authentication and key agreement based on three factors and PUF for UAV-assisted post-disaster emergency communication,” IEEE Internet of Things Journal, vol. 11, pp. 20457-20472, 2024.
  10. G. Bansal and B. K. Sikdar, “A secure and efficient mutual authentication protocol framework for unmanned aerial vehicles,” in 2021 IEEE Globecom Workshops (GC Wkshps), pp. 1-6, 2021.
  11. O. Albahri, A. Zaidan, A. Albahri, B. Zaidan, K. H. Abdulkareem, Z. Al-Qaysi, A. Alamoodi, A. Aleesa, M. Chyad, and R. Alesa, “Systematic review of artificial intelligence techniques in the detection and classification of COVID-19 medical images in terms of evaluation and benchmarking: Taxonomy analysis, challenges, future solutions and methodological aspects,” Journal of Infection and Public Health, vol. 13, no. 10, pp. 1381-1396, 2020.
  12. “Survey of UAV security authentication and cryptography protocols,” Iraqi Journal of Computers, Communications, Control and Systems Engineering, 2024.
  13. Z. G. Al-Mekhlaf, M. A. Saare, J. M. H. Altmemi, B. A. Mohammed, G. Alshammari, Y. A. Alkhabra, and I. Alreshidi, “A quantum-resilient lattice-based security framework for Internet of Medical Things in healthcare systems,” Journal of King Saud University Computer and Information Sciences, vol. 37, no. 6, pp. 1-19, 2025.
  14. A. Alamoodi, B. Zaidan, A. Zaidan, O. Albahri, J. Chen, M. Chyad, S. Garfan, and A. Aleesa, “Machine learning-based imputation soft computing approach for large missing scale and non-reference data imputation,” Chaos, Solitons & Fractals, vol. 151, p. 111236, 2021.
  15. M. A. Al-Shareeda, A. A. H. Ghadban, A. A. H. Glass, E. M. A. Hadi, and M. A. Almaiah, “Efficient implementation of post-quantum digital signatures on Raspberry Pi,” Discover Applied Sciences, vol. 7, no. 6, p. 597, 2025.
  16. U. C. Çabuk, G. Dalkılıç, and O. Dagdeviren, “COMAD: Context-aware mutual authentication protocol for drone networks,” IEEE Access, vol. 9, pp. 78400-78414, 2021.
  17. A. D. Algarni, N. Innab, and F. Algarni, “A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones,” PLOS ONE, vol. 20, no. 3, p. e0314475, 2025.
  18. R. Karmakar, G. Kaddoum, and O. Akhrif, “A blockchain-based distributed and intelligent clustering-enabled authentication protocol for UAV swarms,” IEEE Transactions on Mobile Computing, vol. 23, pp. 6178-6195, 2024.
  19. M. A. El-Zawawy, A. Brighente, and M. Conti, “SETCAP: Service-based energy-efficient temporal credential authentication protocol for Internet of Drones,” Computer Networks, vol. 206, p. 108804, 2022.
  20. N. Constantinescu, O. A. Ticleanu, and I. D. Hunyadi, “Securing authentication and detecting malicious entities in drone missions,” Drones, 2024.


    HOME

       - Conference
       - Journal
       - Paper Submission to Conference
       - Paper Submission to Journal
       - Fee Payment
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceeding


    PROCEEDINGS

       - Volume 13, Issue 5 (ICAIIT 2025)
       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    LAST CONFERENCE

       ICAIIT 2026
         - Photos
         - Reports

    PAST CONFERENCES

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.