This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Open AccessArticle
Secure and Decentralised Swarm Authentication Using Hardware Security Primitives
by
Sagir Muhammad Ahmad
Sagir Muhammad Ahmad
and
Barmak Honarvar Shakibaei Asli
Barmak Honarvar Shakibaei Asli *
Faculty of Engineering and Applied Sciences, Cranfield University, Cranfield MK43 0AL, UK
*
Author to whom correspondence should be addressed.
Electronics 2026, 15(2), 423; https://doi.org/10.3390/electronics15020423 (registering DOI)
Submission received: 24 December 2025
/
Revised: 13 January 2026
/
Accepted: 17 January 2026
/
Published: 18 January 2026
Abstract
Autonomous drone swarms are increasingly deployed in critical domains such as infrastructure inspection, environmental monitoring, and emergency response. While their distributed operation enables scalability and resilience, it also introduces new vulnerabilities, particularly in authentication and trust establishment. Conventional cryptographic solutions, including public key infrastructures (PKI) and symmetric key protocols, impose computational and connectivity requirements unsuited to resource-constrained and external infrastructure-free swarm deployments. In this paper, we present a decentralized authentication scheme rooted in hardware security primitives (HSPs); specifically, Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs). The protocol leverages master-initiated token broadcasting, iterative HSP seed evolution, randomized response delays, and statistical trust evaluation to detect cloning, replay, and impersonation attacks without reliance on centralized authorities or pre-distributed keys. Simulation studies demonstrate that the scheme achieves lightweight operation, rapid anomaly detection, and robustness against wireless interference, making it well-suited for real-time swarm systems.
Share and Cite
MDPI and ACS Style
Ahmad, S.M.; Asli, B.H.S.
Secure and Decentralised Swarm Authentication Using Hardware Security Primitives. Electronics 2026, 15, 423.
https://doi.org/10.3390/electronics15020423
AMA Style
Ahmad SM, Asli BHS.
Secure and Decentralised Swarm Authentication Using Hardware Security Primitives. Electronics. 2026; 15(2):423.
https://doi.org/10.3390/electronics15020423
Chicago/Turabian Style
Ahmad, Sagir Muhammad, and Barmak Honarvar Shakibaei Asli.
2026. "Secure and Decentralised Swarm Authentication Using Hardware Security Primitives" Electronics 15, no. 2: 423.
https://doi.org/10.3390/electronics15020423
APA Style
Ahmad, S. M., & Asli, B. H. S.
(2026). Secure and Decentralised Swarm Authentication Using Hardware Security Primitives. Electronics, 15(2), 423.
https://doi.org/10.3390/electronics15020423
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details
here.
Article Metrics
Article metric data becomes available approximately 24 hours after publication online.