A Post-Quantum Authentication and Key Agreement Scheme for Drone Swarms
Abstract
1. Introduction
1.1. Research Background
1.2. Research Status and Requirements
1.3. Research Objectives
2. Preliminaries
2.1. CRYSTALS-Kyber
2.2. CRYSTALS-Dilithium
2.3. Sparse Merkle Tree
2.4. Aggregation Function HKDF
2.5. SPHINCS+
3. Our Scheme
3.1. System Architecture and Roles of Participants
3.2. System Initialization
- Scheme One:
- Scheme two:
3.3. Group Authentication
3.4. Group Key Agreement
3.5. Encrypted Communication Phase
3.6. Dynamic Membership Management
4. Security Analysis
4.1. Basic Security Properties
4.1.1. Authentication
4.1.2. Confidentiality
4.1.3. Forward Safety
4.1.4. Post-Quantum Security
4.2. Analysis of Anti-Attack Capability
- (1)
- Resistant to replay attacks:
- (2)
- Security proof against man-in-the-middle attack:
- (3)
- Security against forgery attack:
- (4)
- In the UAV swarm communication scenario, Denial of Service (DoS) attack is a common and serious security threat. An attacker may attempt to make edge computing nodes or individual UAVs into a resource exhaustion state by sending a large number of forged authentication requests or repeatedly initiating the key agreement process. In this regard, the post-quantum secure communication protocol proposed in this paper has certain natural defense capabilities in design, and the reasons are as follows:
4.3. Security Analysis of the Overall Protocol
- (1)
- Group key Agreement security
- (2)
- Authentication Security
- (3)
- Protocol Composition Security
5. Performance Analysis
5.1. Memory Footprint Analysis
5.2. Running Time Analysis
Summary of Performance Analysis
6. Conclusions and Future Work
6.1. Conclusions
6.2. Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Wu, Q.; Zhang, Y.; Yang, Z.; Shikh-Bahaei, M.R. Deep Learning for Secure UAV Swarm Communication Under Malicious Attacks. IEEE Trans. Wirel. Commun. 2024, 23, 14879–14894. [Google Scholar] [CrossRef]
- Khan, M.A.; Javaid, S.; Mohsan, S.A.H.; Tanveer, M.; Ullah, I. Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review. IEEE Open J. Commun. Soc. 2024, 5, 6849–6871. [Google Scholar] [CrossRef]
- Xia, T.; Wang, M.; He, J.; Yang, G.; Fan, L.; Wei, G. A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm. Drones 2024, 8, 359. [Google Scholar] [CrossRef]
- Ouadah, M.; Merazka, F. Securing UAV Communication: Authentication and Integrity. In Proceedings of the 2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM), Rabat, Morocco, 23–25 July 2024; pp. 1–7. [Google Scholar] [CrossRef]
- Dahlberg, R.; Pulls, T.; Peeters, R. Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs. Cryptology ePrint Arch. 2016, Report 2016/683. Available online: https://eprint.iacr.org/2016/683 (accessed on 18 August 2025).
- Bos, J.; Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schanck, J.M.; Schwabe, P.; Seiler, G.; Stehlé, D. CRYSTALS-Kyber: A CCA-Secure Module-Lattice-Based KEM. In Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, 24–26 April 2018; pp. 353–367. [Google Scholar] [CrossRef]
- Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schwabe, P.; Seiler, G.; Stehlé, D. CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018, 2018, 238–268. [Google Scholar] [CrossRef]
- Ravi, P. Side-Channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC Candidate. IACR Cryptol. ePrint Arch. 2018. Available online: https://eprint.iacr.org/2018/ (accessed on 18 August 2025).
- Mishra, D.; Singh, M.; Rewal, P.; Pursharthi, K.; Kumar, N.; Barnawi, A.; Rathore, R.S. Quantum-safe secure and authorized communication protocol for internet of drones. IEEE Trans. Veh. Technol. 2023, 72, 16499–16507. [Google Scholar] [CrossRef]
- Javaid, S.; Saeed, N.; Qadir, Z.; Fahim, H.; He, B.; Song, H.; Bilal, M. Communication and Control in Collaborative UAVs: Recent Advances and Future Trends. IEEE Trans. Intell. Transp. Syst. 2023, 24, 5719–5739. [Google Scholar] [CrossRef]
- Aydin, Y.; Kurt, G.K.; Ozdemir, E.; Yanikomeroglu, H. Authentication and Handover Challenges and Methods for Drone Swarms. IEEE J. Radio Freq. Identif. 2022, 6, 220–228. [Google Scholar] [CrossRef]
- Zhou, J.; Luo, M.; Song, L.; Hu, J. A Dynamic Group Key Agreement Scheme for UAV Networks Based on Blockchain. Pervasive Mob. Comput. 2023, 95, 101844. [Google Scholar] [CrossRef]
- Chaudhary, D.; Lee, C.-C. Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones. Comput. Electr. Eng. 2024, 120, 109774. [Google Scholar] [CrossRef]
- Bu, Y.; Yan, Y.; Yang, Y. Advancement Challenges in UAV Swarm Formation Control: A Comprehensive Review. Drones 2024, 8, 320. [Google Scholar] [CrossRef]
- Almeida, J.B.; Arranz Olmos, S.; Barbosa, M.; Barthe, G.; Dupressoir, F.; Grégoire, B.; Laporte, V.; Léchenet, J.-C.; Low, C.; Oliveira, T.; et al. Formally Verifying Kyber: Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt. In Proceedings of the Advances in Cryptology—EUROCRYPT 2024, Santa Barbara, CA, USA, 18–22 August 2024; pp. 384–421. [Google Scholar] [CrossRef]
- Barbosa, M.; Barthe, G.; Doczkal, C.; Don, J.; Fehr, S.; Grégoire, B.; Huang, Y.-H.; Hülsing, A.; Lee, Y.; Wu, X. Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium. In Advances in Cryptology – CRYPTO 2023; Handschuh, H., Lysyanskaya, A., Eds.; Lecture Notes in Computer Science; Springer: Berlin, Germany, 2023; Volume 5, pp. 358–389. [Google Scholar] [CrossRef]
- Han, P.; Sui, A.; Wu, J. Lightweight Secure Communication Supporting Batch Authentication for UAV Swarm. Drones 2025, 9, 139. [Google Scholar] [CrossRef]
- Han, K.; Al Nuaimi, E.; Al Blooshi, S.; Psiakis, R.; Yeun, C.Y. A new scalable mutual authentication in fog-edge drone swarm environment. In Proceedings of the International Conference on Information Security Practice and Experience (ISPEC); Springer: Cham, Switzerland, 2022; pp. 179–196. [Google Scholar]
- Sharma, T.; Soleymani, S.A.; Shojafar, M.; Tafazolli, R. Secured communication schemes for UAVs in 5G: CRYSTALS-Kyber and IDS. In Proceedings of the 2024 IEEE Future Networks World Forum (FNWF), Dubai, United Arab Emirates, 15–17 October 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 655–660. [Google Scholar]
- Zhu, Y.; Liu, Y.; Wu, M.; Li, J.; Liu, S.; Zhao, J. Research on Secure Communication on In-Vehicle Ethernet Based on Post-Quantum Algorithm NTRUEncrypt. Electronics 2022, 11, 856. [Google Scholar] [CrossRef]
- Han, K.; Al Nuaimi, E.; Al Blooshi, S.; Psiakis, R.; Yeun, C.Y. Scalable Authenticated Communication in Drone Swarm Environment. J. Internet Technol. 2024, 25, 255–265. [Google Scholar] [CrossRef]
- Nair, A.S.; Thampi, S.M.; Jafeel, V. A Post-Quantum Secure PUF Based Cross-Domain Authentication Mechanism for Internet of Drones. Veh. Commun. 2024, 47, 100780. [Google Scholar] [CrossRef]
- Alqudsi, Y.; Makaraci, M. UAV swarms: Research, challenges, and future directions. J. Eng. Appl. Sci. 2025, 72, 12. [Google Scholar] [CrossRef]
- D’Oliveira, R.G.L.; Cohen, A.; Robinson, J.; Stahlbuhk, T.; Médard, M. Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks. In Proceedings of the MILCOM 2021-IEEE Military Communications Conference, San Diego, CA, USA, 29 November–2 December 2021; pp. 933–938. [Google Scholar] [CrossRef]
- Chen, A.C.H.; Lin, B.Y. Hybrid Scheme of Post-Quantum Cryptography and Elliptic—Curve Cryptography for Certificates—A Case Study of Security Credential Management System in Vehicle-to-Everything Communications. In Proceedings of the 2024 7th International Conference on Circuit Power and Computing Technologies (ICCPCT), Nagercoil, India, 8–9 August 2024; pp. 426–430. [Google Scholar] [CrossRef]
- Twardokus, G.; Bindel, N.; Rahbari, H.; McCarthy, S. When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications. In Proceedings of the 31st Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 26 February–1 March 2024; Available online: https://www.ndss-symposium.org/ (accessed on 18 August 2025).
- Vidaković, M.; Miličević, K. Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments. Algorithms 2023, 16, 518. [Google Scholar] [CrossRef]
- Barbosa, M.; Dupressoir, F.; Hülsing, A.; Meijers, M.; Strub, P.Y. A Tight Security Proof for SPHINCS+, Formally Verified. In Advances in Cryptology—ASIACRYPT 2024; Chung, K.M., Sasaki, Y., Eds.; Springer Nature: Singapore, 2025; pp. 35–67. [Google Scholar] [CrossRef]
- Kumar, M. Post-quantum Cryptography Algorithm’s Standardization and Performance Analysis. Array 2022, 15, 100242. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
He, L.; Zhao, M.; Wang, X.; Wang, J.; Wang, Z.; Liu, S. A Post-Quantum Authentication and Key Agreement Scheme for Drone Swarms. Electronics 2025, 14, 3364. https://doi.org/10.3390/electronics14173364
He L, Zhao M, Wang X, Wang J, Wang Z, Liu S. A Post-Quantum Authentication and Key Agreement Scheme for Drone Swarms. Electronics. 2025; 14(17):3364. https://doi.org/10.3390/electronics14173364
Chicago/Turabian StyleHe, Linlin, Meng Zhao, Xu’an Wang, Jue Wang, Zhenyu Wang, and Shuanggen Liu. 2025. "A Post-Quantum Authentication and Key Agreement Scheme for Drone Swarms" Electronics 14, no. 17: 3364. https://doi.org/10.3390/electronics14173364
APA StyleHe, L., Zhao, M., Wang, X., Wang, J., Wang, Z., & Liu, S. (2025). A Post-Quantum Authentication and Key Agreement Scheme for Drone Swarms. Electronics, 14(17), 3364. https://doi.org/10.3390/electronics14173364