Next Article in Journal
SLTP: A Symbolic Travel-Planning Agent Framework with Decoupled Translation and Heuristic Tree Search
Previous Article in Journal
HIEA: Hierarchical Inference for Entity Alignment with Collaboration of Instruction-Tuned Large Language Models and Small Models
Previous Article in Special Issue
A Low-Cost UAV System and Dataset for Real-Time Weed Detection in Salad Crops
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Secure and Decentralised Swarm Authentication Using Hardware Security Primitives

by
Sagir Muhammad Ahmad
and
Barmak Honarvar Shakibaei Asli
*
Faculty of Engineering and Applied Sciences, Cranfield University, Cranfield MK43 0AL, UK
*
Author to whom correspondence should be addressed.
Electronics 2026, 15(2), 423; https://doi.org/10.3390/electronics15020423 (registering DOI)
Submission received: 24 December 2025 / Revised: 13 January 2026 / Accepted: 17 January 2026 / Published: 18 January 2026
(This article belongs to the Special Issue Unmanned Aircraft Systems with Autonomous Navigation, 2nd Edition)

Abstract

Autonomous drone swarms are increasingly deployed in critical domains such as infrastructure inspection, environmental monitoring, and emergency response. While their distributed operation enables scalability and resilience, it also introduces new vulnerabilities, particularly in authentication and trust establishment. Conventional cryptographic solutions, including public key infrastructures (PKI) and symmetric key protocols, impose computational and connectivity requirements unsuited to resource-constrained and external infrastructure-free swarm deployments. In this paper, we present a decentralized authentication scheme rooted in hardware security primitives (HSPs); specifically, Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs). The protocol leverages master-initiated token broadcasting, iterative HSP seed evolution, randomized response delays, and statistical trust evaluation to detect cloning, replay, and impersonation attacks without reliance on centralized authorities or pre-distributed keys. Simulation studies demonstrate that the scheme achieves lightweight operation, rapid anomaly detection, and robustness against wireless interference, making it well-suited for real-time swarm systems.
Keywords: swarm drones; PUF; decentralized; lightweight swarm drones; PUF; decentralized; lightweight

Share and Cite

MDPI and ACS Style

Ahmad, S.M.; Asli, B.H.S. Secure and Decentralised Swarm Authentication Using Hardware Security Primitives. Electronics 2026, 15, 423. https://doi.org/10.3390/electronics15020423

AMA Style

Ahmad SM, Asli BHS. Secure and Decentralised Swarm Authentication Using Hardware Security Primitives. Electronics. 2026; 15(2):423. https://doi.org/10.3390/electronics15020423

Chicago/Turabian Style

Ahmad, Sagir Muhammad, and Barmak Honarvar Shakibaei Asli. 2026. "Secure and Decentralised Swarm Authentication Using Hardware Security Primitives" Electronics 15, no. 2: 423. https://doi.org/10.3390/electronics15020423

APA Style

Ahmad, S. M., & Asli, B. H. S. (2026). Secure and Decentralised Swarm Authentication Using Hardware Security Primitives. Electronics, 15(2), 423. https://doi.org/10.3390/electronics15020423

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop