Secure LoRa Drone-to-Drone Communication for Public Blockchain-Based UAV Traffic Management
Abstract
Highlights
- Efficient Drone-to-Drone communication protocol fusion with a blockchain network for the purpose of secure and efficient Unmanned Aerial Vehicle Traffic Management is presented.
- Superior performance compared to state of the art.
- Lower computational and storage costs.
Abstract
1. Introduction
- A lightweight protocol designed to enable secure D2D LoRa-based communication for secure public blockchain-based traffic management to avoid collisions.
- This protocol enables UAVs to authenticate nearby UAVs from different service providers that are registered with the UTM system.
- The protocol protects sensitive flight data of UAVs stored on the public blockchain-based UTM from attackers.
- The proposed protocol has been analyzed to ensure it is secure from key disclosure, adversary-in-the-middle, replay, and tracking attacks.
2. Related Works
3. Secure LoRa Drone-to-Drone Communication Using Public Blockchain-Based Traffic Management System
3.1. Initial Phase
- 1.
- Each service provider registers with a public blockchain-based UTM to obtain a pair of public and private keys, which can be used to make flight operation transactions on the Ethereum blockchain.
- 2.
- The UTM generates two random numbers, namely and , which will be returned to service providers.
- 3.
- The service providers generate two session keys, each being valid for a 24 h period in sequence to support flight operations that span more than one day (e.g., is valid from 00:01 to 24:00 on the first day and is valid from 00:01 to 24:00 on the second day). This session key, , or both session keys ( and ) as well as the random number, , will be stored on the UAVs depending on their registered flight time.
- 4.
- The UAV operators register their UAVs with a service provider and obtain unique UAV IDs.
- 5.
- The UAV operators submit UAVs flight plans to service providers.
- 6.
- The service providers provide flight activities of UAVs to UTM, including the intended flight destination, flight path, and speed, by making transactions on the Ethereum public blockchain.
3.2. Authentication Phase
- 1.
- UAV1 determines its global position via installed sensors, as shown in Table 3. It measures its velocity (i.e., vx and vy) by using an Inertial Measurement Unit (IMU). Velocity of vz is not included in the computed message , since it is needed for take-off and landing and is not as vital as vx and vy, which are critical for navigation and maintaining UAV flights. It also obtains its longitude, latitude, and altitude using the Global Positioning System (GPS). These data will be concatenated to a 128-bit global position message, , as described in Table 3.
- 2.
- UAV1 then encrypts the 32-bit UAV by XOR-ing it with the 32-bit Unix timestamp, where . It then concatenates the 32-bit UAV , current 32-bit Unix timestamp, , a 64-bit UAV flight destination, and the 128-bit global position message, to construct a 256-bit concatenated message, , as presented in Figure 2.
- 3.
- UAV1 then computes an output hash, by hashing M with the session key, , where . This output hash is used for data integrity protection purposes.
- 4.
- UAV1 computes an encrypted message, by bitwise XOR-ing with and , where .
- 5.
- UAV1 broadcasts the output hash, and the encrypted message, to nearby UAVs through LoRa peer-to-peer communication to update its global position.
- 6.
- UAV2 receives the and values from UAV1. The UAV2 then extracts the concatenated message, from the by XOR-ing with its stored and , where .
- 7.
- UAV2 proceeds to compute an output hash, by performing hashing of and using the SHA256 hash function, where .
- 8.
- UAV2 authenticates the messages sent from UAV1 if the computed output hash, , is equal to the received output hash, . UAV2 then extracts the global position data from the concatenated message, , and adjusts its flight path if there is a potential collision with the nearby UAV1. Otherwise, the UAV2 terminates the session and deletes the received message, .
- 9.
- UAVs transmit the output hash, and the encrypted to service providers when they are covered by Wi-Fi. The authentication of the UAVs will be verified, and the message, , will be decrypted by the service providers using their stored and .
- 10.
- The service providers update the global position of UAVs by making transactions of encrypted on the Ethereum public blockchain. The UAVs flight activities can only be decrypted and viewed by authorized service providers.
4. Proof of Concept
4.1. Development of UAVs with an Onboard LoRa Communication Module
4.2. Development of a Decentralized UAV Traffic Management Web Application Platform
Algorithm 1: Pseudo-code of updateFlight() |
Input: valueEm: bytes32 |
1. if (msg.sender == owner) 2. if (balance > transaction fee) 3. assign valueEm to storedEm 4. else 5. revert the transaction 6. end 7. else 8. revert the transaction 9. end |
5. General Security Analysis
5.1. Secret Key Disclosure Attack
5.2. Replay Attack
5.3. Adversary-in-the-Middle Attack
5.4. Tracking Attack
6. Comparative Performance Analysis
6.1. UTM Access Management with D2D Communication Integration
6.2. Computation Cost
6.3. Storage Cost
6.4. Formal Security Analysis
6.5. LoRa Payload Size Analysis
6.6. Smart Contract Vulnerability Analysis
7. Limitations and Future Work
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Dizeu, F.B.D.; Picard, M.; Drouin, M.A.; Gagné, G. Extracting Unambiguous Drone Signature Using High-Speed Camera. IEEE Access 2022, 10, 45317–45336. [Google Scholar] [CrossRef]
- Seidaliyeva, U.; Ilipbayeva, L.; Utebayeva, D.; Smailov, N.; Matson, E.T.; Tashtay, Y.; Turumbetov, M.; Sabibolda, A. LiDAR Technology for UAV Detection: From Fundamentals and Operational Principles to Advanced Detection and Classification Techniques. Sensors 2025, 25, 2757. [Google Scholar] [CrossRef]
- Bertocco, M.; Brighente, A.; Ciattaglia, G.; Gambi, E.; Peruzzi, G.; Pozzebon, A.; Spinsante, S. Malicious Drone Identification by Vibration Signature Measurement: A Radar-Based Approach. IEEE Trans. Instrum. Meas. 2025, 74, 1–15. [Google Scholar] [CrossRef]
- Aouladhadj, D.; Kpre, E.; Deniau, V.; Kharchouf, A.; Gransart, C.; Gaquière, C. Drone Detection and Tracking Using RF Identification Signals. Sensors 2023, 23, 7650. [Google Scholar] [CrossRef] [PubMed]
- Tedeschi, P.; Nuaimi, F.A.A.; Awad, A.I.; Natalizio, E. Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions. IEEE Trans. Ind. Inform. 2024, 20, 1069–1080. [Google Scholar] [CrossRef]
- Rahman, M.S.; Khalil, I.; Atiquzzaman, M. Blockchain-Powered Policy Enforcement for Ensuring Flight Compliance in Drone-Based Service Systems. IEEE Netw. 2021, 35, 116–123. [Google Scholar] [CrossRef]
- Allouch, A.; Cheikhrouhou, O.; Koubâa, A.; Toumi, K.; Khalgui, M.; Nguyen Gia, T. UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones. Sensors 2021, 21, 3049. [Google Scholar] [CrossRef]
- Tan, Y.; Liu, J.; Kato, N. Blockchain-Based Lightweight Authentication for Resilient UAV Communications: Architecture, Scheme, and Future Directions. IEEE Wirel. Commun. 2022, 29, 24–31. [Google Scholar] [CrossRef]
- Alkadi, R.; Shoufan, A. Unmanned Aerial Vehicles Traffic Management Solution Using Crowd-Sensing and Blockchain. IEEE Trans. Netw. Serv. Manag. 2023, 20, 201–215. [Google Scholar] [CrossRef]
- Zhang, L.; Lee, B.; Ye, Y.; Qiao, Y. Evaluation of Ethereum End-to-end Transaction Latency. In Proceedings of the 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 19–21 April 2021; pp. 1–5. [Google Scholar]
- Rezaee, M.R.; Hamid, N.A.W.A.; Hussin, M.; Zukarnain, Z.A. Comprehensive Review of Drones Collision Avoidance Schemes: Challenges and Open Issues. IEEE Trans. Intell. Transp. Syst. 2024, 25, 6397–6426. [Google Scholar] [CrossRef]
- Noor, F.; Khan, M.A.; Al-Zahrani, A.; Ullah, I.; Al-Dhlan, K.A. A Review on Communications Perspective of Flying Ad-Hoc Networks: Key Enabling Wireless Technologies, Applications, Challenges and Open Research Topics. Drones 2020, 4, 65. [Google Scholar] [CrossRef]
- Fakhreddine, A.; Raffelsberger, C.; Sende, M.; Bettstetter, C. Experiments on Drone-to-Drone Communication with Wi-Fi, LTE-A, and 5G. In Proceedings of the 2022 IEEE Globecom Workshops (GC Wkshps), Rio de Janeiro, Brazil, 4–8 December 2022; pp. 904–909. [Google Scholar]
- Khor, J.H.; Sidorov, M.; Law, S.Z.; Tan, S.Y.; Woon, P.Y. Public Blockchain-Based Data Integrity Protection for Federated Learning in UAV Networks Using MAVLink Protocol. In Proceedings of the International Conference on Green Energy, Computing and Intelligent Technology, Iskandar Puteri, Malaysia, 10–12 July 2023; pp. 321–333. [Google Scholar]
- Khan, N.-A.; Jhanjhi, N.-Z.; Brohi, S.-N.; Almazroi, A.-A.; Almazroi, A.-A. A Secure Communication Protocol for Unmanned Aerial Vehicles. CMC-Comput. Mater. Contin. 2022, 70, 601–618. [Google Scholar]
- Khor, J.H.; Sidorov, M.; Zulqarnain, S.A. Scalable Lightweight Protocol for Interoperable Public Blockchain-Based Supply Chain Ownership Management. Sensors 2023, 23, 3433. [Google Scholar] [CrossRef] [PubMed]
- Tsakmakis, A.; Valkanis, A.; Beletsioti, G.; Kantelis, K.; Nicopolitidis, P.; Papadimitriou, G. An Adaptive LoRaWAN MAC Protocol for Event Detection Applications. Sensors 2022, 22, 3538. [Google Scholar] [CrossRef]
- Pötsch, A.; Hammer, F. Towards End-to-End Latency of LoRaWAN: Experimental Analysis and IIoT Applicability. In Proceedings of the 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), Sundsvall, Sweden, 27–29 May 2019; pp. 1–4. [Google Scholar]
- Tamang, D.; Pozzebon, A.; Parri, L.; Fort, A.; Abrardo, A. Designing a Reliable and Low-Latency LoRaWAN Solution for Environmental Monitoring in Factories at Major Accident Risk. Sensors 2022, 22, 2372. [Google Scholar] [CrossRef]
- Ghazali, M.H.M.; Teoh, K.; Rahiman, W. A Systematic Review of Real-Time Deployments of UAV-Based LoRa Communication Network. IEEE Access 2021, 9, 124817–124830. [Google Scholar] [CrossRef]
- Allouch, A.; Cheikhrouhou, O.; Koubâa, A.; Khalgui, M.; Abbes, T. MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems. In Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, Tangier, Morocco, 24–28 June 2019; pp. 621–628. [Google Scholar]
- Morel, A.E.; Ufuktepe, D.K.; Ignatowicz, R.; Riddle, A.; Qu, C.; Calyam, P.; Palaniappan, K. Enhancing Network-edge Connectivity and Computation Security in Drone Video Analytics. In Proceedings of the IEEE Applied Imagery Pattern Recognition Workshop, Washington, DC, USA, 13–15 October 2020; pp. 1–12. [Google Scholar]
- Zahra, S.W.; Arshad, A.; Nadeem, M.; Riaz, S.; Dutta, A.K.; Alzaid, Z.; Alabdan, R.; Almutairi, B.; Almotairi, S. Development of Security Rules and Mechanisms to Protect Data from Assaults. Appl. Sci. 2022, 12, 12578. [Google Scholar] [CrossRef]
- Jan, S.U.; Qayum, F.; Khan, H.U. Design and Analysis of Lightweight Authentication Protocol for Securing IoD. IEEE Access 2021, 9, 69287–69306. [Google Scholar] [CrossRef]
- Ko, Y.; Kim, J.; Duguma, D.G.; Astillo, P.V.; You, I.; Pau, G. Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone. Sensors 2021, 21, 2057. [Google Scholar] [CrossRef]
- Lounis, K.; Ding, S.H.H.; Zulkernine, M. D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions. IEEE Trans. Veh. Technol. 2023, 72, 5079–5093. [Google Scholar] [CrossRef]
- Top 10 Drones With The Longest Flight Time in 2023. Available online: https://www.jouav.com/blog/drone-with-longest-flight-time.html#:~:text=The%20average%20flight%20time%20of,even%20fly%20for%20several%20hours (accessed on 19 January 2023).
- Elhassan, S.A.M.; Kamal, N.L.M.; Norhashim, N.; Sahwee, Z.; Shah, S.A. Unmanned aerial vehicle localisation using RSSI-based trilateration. In Proceedings of the International Conference on Green Energy, Computing and Intelligent Technology 2024 (GEn-CITy 2024), Iskandar Puteri, Malaysia, 11–13 December 2024; pp. 235–240. [Google Scholar]
- LoRa Calculator. Available online: https://www.semtech.com/design-support/lora-calculator (accessed on 7 August 2025).
- Seeed Studio. LoRa-E5: LoRa Wireless Module-Powered by STM32WLE5 (AT Command Specification); Seeed Studio: Shenzhen, China, 2020. [Google Scholar]
- MTSFB and MCMC. Short Range Devices-Specifications; MTSFB: Kuala Lumpur, Malaysia; MCMC: Cyberjaya, Malaysia, 2025. [Google Scholar]
- Allende, M.; León, D.L.; Cerón, S.; Pareja, A.; Pacheco, E.; Leal, A.; Da Silva, M.; Pardo, A.; Jones, D.; Worrall, D.J.; et al. Quantum-resistance in blockchain networks. Sci. Rep. 2023, 13, 5664. [Google Scholar] [CrossRef] [PubMed]
- Khor, J.H.; Sidorov, M.; Ong, M.T.; Chua, S.Y. Public Blockchain-based Data Integrity Verification for Low-power IoT Devices. IEEE Internet Things J. 2023, 10, 13056–13064. [Google Scholar] [CrossRef]
- LoRa Networking Guide-Transmission Modes. Available online: https://development.libelium.com/lora_networking_guide/transmission-modes (accessed on 1 July 2024).
- Khor, J.H.; Sidorov, M.; Woon, P.Y. Public Blockchains for Resource-constrained IoT Devices-A State of the Art Survey. IEEE Internet Things J. 2021, 8, 11960–11982. [Google Scholar] [CrossRef]
- Sidorov, M.; Khor, J.H.; Wong, A.C.H.; Lee, Y.Y.; Li, J. A Lightweight Authentication Scheme for LoRaWAN Nodes Represented as On-Chain Non-Fungible Tokens. IEEE Sens. J. 2024, 24, 28222–28232. [Google Scholar] [CrossRef]
- Lima, W.G.; Lopes, A.V.R.; Cardoso, C.M.M.; Araújo, J.P.L.; Neto, M.C.A.; Tostes, M.E.L.; Nascimento, A.A.; Rodriguez, M.; Barros, F.J.B. LoRa Technology Propagation Models for IoT Network Planning in the Amazon Regions. Sensors 2024, 24, 1621. [Google Scholar] [CrossRef]
- Choi, R.; Lee, S.; Lee, S. Reliability Improvement of LoRa with ARQ and Relay Node. Symmetry 2020, 12, 552. [Google Scholar] [CrossRef]
- Feist, J.; Grieco, G.; Groce, A. Slither: A Static Analysis Framework for Smart Contracts. In Proceedings of the 2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), Montreal, QC, Canada, 27 May 2019; pp. 8–15. [Google Scholar]
Notation | Description | Purpose |
---|---|---|
A 32-bit UAV ID | To identify the UAV identity | |
A 32-bit encrypted UAV ID | To prevent tracking attacks on UAV identity | |
A 256-bit random number | To provide a random value for hash output and encryption | |
A 256-bit random number | To be used for session key updates | |
A 32-bit Unix timestamp for the start of the first day | To be used for the generation of sk1 | |
A 32-bit Unix timestamp for the start of the second day | To be used for the generation of sk2 | |
A 32-bit current Unix timestamp | To be used for the generation of message M | |
A 256-bit session key for the first day | Session key for UAVs for flight time within a day | |
A 256-bit session key for the second day | Additional session key for UAVs for flight time of more than a day | |
SHA256 hash function | To generate a 256-bit hash output | |
⊕ | Bitwise XOR | To encrypt a flight message |
A 128-bit global position message | UAV flight information | |
A 256-bit concatenated message | A concatenation of a Unix timestamp and a global position message | |
A 256-bit output hash | To ensure the data integrity of message M | |
A 256-bit encrypted message | To safeguard message M from security attacks |
Nonce | Start of Day | Unix Timestamp |
---|---|---|
20 July 2024, 12:00:00 a.m. | 1721433600 | |
21 July 2024, 12:00:00 a.m. | 1721520000 |
Field | Description | Data Type | Units |
---|---|---|---|
alt | Altitude | Int32 | mm |
lat | Latitude | Int32 | degE7 |
lon | Longitude | Int32 | degE7 |
vx | Ground X speed | Int16 | cm/s |
vy | Ground Y speed | Int16 | cm/s |
Data Rate (DR) | Spreading Factor (SF) | Channel Frequency (kHz) | AS923 Payload Size (Bytes) | Successful Message Transmission Using LoRa Peer-to-Peer |
---|---|---|---|---|
0 | SF12 | 125 | 51 | Yes |
1 | SF11 | 125 | 51 | Yes |
2 | SF10 | 125 | 51 | Yes |
3 | SF9 | 125 | 115 | Yes |
4 | SF8 | 125 | 242 | Yes |
5 | SF7 | 125 | 242 | Yes |
6 | SF7 | 250 | 242 | Yes |
Description | This Work | [7] | [8] | [9] | [24] | [25] | [26] |
---|---|---|---|---|---|---|---|
Support UTM | Yes | Yes | No | Yes | No | No | No |
Blockchain | Ethereum | Hyperledger Fabric | Hyperledger Fabric | Ethereum | N/A | N/A | N/A |
Blockchain type | Public | Permissioned private | Permissioned consortium | Permissioned public | N/A | N/A | N/A |
Access control | Symmetric key | Private blockchain | Consortium blockchain | Function access modifier | N/A | N/A | N/A |
Support D2D communication | Yes | No | Yes | No | Yes | Yes | Yes |
IoT device used for proof of concept | Arduino Uno R3 | N/A | Windows 10 PC | N/A | Samsung Galaxy S5 | Raspberry Pi | Arduino Uno |
Computation cost (ms) | 0.01 | N/A | 19.41 | N/A | 17.79 | 29.00 | 311.93 |
Cryptography used in D2D protocol | 1 SHA256 3 XOR | N/A | ECC | N/A | 1 Mult. 7 HMAC 8 XOR | ECDSA 7 HMAC | 16 Hash Funct. 10 XOR |
Storage cost (bit) | 544–800 | N/A | N/A | N/A | 1120 | N/A | * Varies |
Encrypted transmitted message | Yes | No | Yes | No | No | Yes | No |
Security analysis of D2D communication Protection against: | |||||||
Secret key disclosure attack | Yes | N/A | Yes | N/A | Yes | Yes | Yes |
Adversary-in-the-middle attack | Yes | N/A | Yes | N/A | Yes | Yes | Yes |
Replay attack | Yes | N/A | Yes | N/A | Yes | Yes | Yes |
Tracking attack | Yes | N/A | No | N/A | Yes | Yes | No |
Drone communication technology | LoRa | N/A | N/A | Wi-Fi Bluetooth | Wireless tech. | Wireless tech. | Wireless tech. |
Experimental analysis of drone communication | Yes | N/A | N/A | No | N/A | N/A | N/A |
Smart contract vulnerability analysis | Yes | No | No | Yes | N/A | N/A | N/A |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khor, J.H.; Sidorov, M.; Chong, M.J.Y. Secure LoRa Drone-to-Drone Communication for Public Blockchain-Based UAV Traffic Management. Sensors 2025, 25, 5087. https://doi.org/10.3390/s25165087
Khor JH, Sidorov M, Chong MJY. Secure LoRa Drone-to-Drone Communication for Public Blockchain-Based UAV Traffic Management. Sensors. 2025; 25(16):5087. https://doi.org/10.3390/s25165087
Chicago/Turabian StyleKhor, Jing Huey, Michail Sidorov, and Melissa Jia Ying Chong. 2025. "Secure LoRa Drone-to-Drone Communication for Public Blockchain-Based UAV Traffic Management" Sensors 25, no. 16: 5087. https://doi.org/10.3390/s25165087
APA StyleKhor, J. H., Sidorov, M., & Chong, M. J. Y. (2025). Secure LoRa Drone-to-Drone Communication for Public Blockchain-Based UAV Traffic Management. Sensors, 25(16), 5087. https://doi.org/10.3390/s25165087