Next Article in Journal
Impact of Low-Frequency RF Injection on Leakage Behavior in Nanoscale NMOS Devices
Next Article in Special Issue
Implementing Post-Quantum Cryptography to Industrial Wireless Networks
Previous Article in Journal
Attention-Weighted Hierarchical Decoding for Few-Shot Semantic Segmentation: A Case Study on Batik Cultural Heritage Patterns
Previous Article in Special Issue
A Review on Federated Learning Architectures for Privacy-Preserving AI: Lightweight and Secure Cloud–Edge–End Collaboration
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy

1
School of Electrical and Data Engineering, University of Technology Sydney, Sydney, NSW 2007, Australia
2
Faculty of Engineering and IT, University of Technology Sydney, Sydney, NSW 2007, Australia
3
School of Computer Science, University of Technology Sydney, Sydney, NSW 2007, Australia
*
Author to whom correspondence should be addressed.
Electronics 2026, 15(6), 1243; https://doi.org/10.3390/electronics15061243
Submission received: 4 February 2026 / Revised: 9 March 2026 / Accepted: 12 March 2026 / Published: 17 March 2026
(This article belongs to the Special Issue Security and Privacy in Networks and Multimedia, 2nd Edition)

Abstract

Secure cross-domain UAV authentication is challenging because identity verification alone is insufficient to guarantee safe operation. In many UAV applications, it is equally critical to verify that a UAV is currently located within an authorized geographic region. Existing approaches often expose precise GPS coordinates, rely on static identifiers that enable tracking, or fail to guarantee the freshness and authenticity of location evidence. These weaknesses allow replay, location spoofing, and trajectory inference attacks, especially in multi-domain environments. To address these limitations, we propose PrivLocAuth, a zero-knowledge-based cross-domain UAV authentication protocol that enforces geofence restrictions without revealing actual locations. In PrivLocAuth, UAVs encode their current coordinates into fresh Pedersen commitments, which are attested by the home Local Domain Server (LDS) using short-lived Schnorr signatures. Based on these attested commitments, UAVs generate Bulletproof range proofs to demonstrate compliance with cross-domain server-defined geofences. This design ensures that UAVs operate within authorized airspace while preserving strong location privacy. PrivLocAuth further incorporates a lightweight elliptic curve cryptography (ECC) and Schnorr signature-based credential framework that enables unlinkable authentication across-domains, preventing session correlation and identity tracking. Formal security analysis demonstrates resistance to impersonation, replay, geofence-bypass, and linkage attacks. Experimental evaluation shows low computational latency and minimal communication overhead, confirming the protocol’s suitability for resource-constrained UAV platforms operating in dynamic cross-domain environments.

1. Introduction

As UAVs increasingly become integral components of the Internet of Drones (IoD), their ability to operate across diverse administrative and geographic domains introduces significant security and privacy challenges [1,2]. In critical applications such as surveillance, disaster response, and smart logistics, UAVs must authenticate with foreign or cross-domain infrastructure while adhering to strict geofence policies. However, location-aware cross-domain authentication introduces vulnerabilities such as location inference and correlation risks, especially when protocols require explicit Global Positioning System (GPS) location coordinates disclosure or rely on home or local domain control centers [3,4,5].
The problem becomes more severe in heterogeneous trust environments, where domain servers may follow the protocol but can still misuse location data through metadata, location logs, or communication patterns [6,7]. Standard public key cryptographic solutions often focus on identity validation and mutual authentication, but neglect location privacy, assuming that positional data is either irrelevant or encrypted [8,9]. Yet, GPS coordinates even when protected can be correlated over time or extracted through side channel analysis, leading to mission compromise or physical UAV targeting [10,11].
To address these challenges, we propose PrivLocAuth, a zero-knowledge-based cross-domain UAV authentication protocol that enforces geofence compliance, location privacy, and session unlinkability without revealing UAV identities or exact coordinates. Each UAV is registered once with a trusted Registration Authority (RA), which establishes the cryptographic system parameters and issues an unlinkable Schnorr-based credential. This credential enables the UAV to demonstrate legitimate membership during authentication sessions without revealing its long-term identity. The RA is consulted on-demand during authentication to verify credentials and enforce revocation, while the Cross-Domain Server (CDS) enforces the RA’s decision without learning the UAV’s real identity.
During each authentication session, the UAV never transmits raw GPS coordinates to any cross-domain server. Instead, it locally encodes its current position into fresh Pedersen commitments using newly generated blinding factors, ensuring strong hiding properties and preventing cross-session linkage. These commitments are submitted to the home LDS, which verifies correctness and freshness according to domain policy and issues a short-lived Schnorr-signed attestation binding the location evidence to the current session. Using this LDS-attested evidence, the UAV constructs Bulletproof range proofs that allow the CDS to verify compliance with authorized geofences without learning exact coordinates or receiving unverified location data. Concurrently, the UAV proves ownership of its RA-issued credential to the CDS, ensuring authentication integrity while preserving unlinkability across sessions and administrative domains.
By combining per-session location commitments, LDS attestation, zero-knowledge range proofs, and unlinkable credential-based authentication, PrivLocAuth enables UAVs to prove compliance with location policies without revealing where they are, preventing trajectory inference and mission exposure. Unlike existing frameworks that require continuous connection to a home authority or trust in every domain, PrivLocAuth supports fully autonomous, privacy-preserving operations across untrusted domains while enabling real-time revocation and auditability.
Our key contributions are summarized as follows:
  • We propose PrivLocAuth, a geofence-aware and privacy-preserving cross-domain authentication framework for UAVs. PrivLocAuth enables a UAV to prove its compliant presence within an authorized geographic region without revealing exact GPS coordinates. By integrating geofence-based authorization with zero-knowledge range proofs, the framework enforces fine-grained spatial access control while preventing trajectory inference, mission leakage, and location-based tracking across-domains.
  • We propose a cross-domain UAV authentication framework in which the RA is involved only during enrollment and on-demand revocation checks. UAV legitimacy is established using RA-issued anonymous credentials, while geofence compliance is endorsed by the LDS through short-lived attestations on session-specific location commitments. The CDS enforces access decisions based on these verifiable LDS endorsements and zero-knowledge proofs, without learning UAV identities or precise locations, thereby enabling scalable and lightweight authentication across multiple administrative domains.
  • The protocol integrates efficient elliptic-curve cryptography, Schnorr signatures, and zero-knowledge proofs. The resulting design achieves a favorable balance between security, privacy, and computational overhead, making it practical for deployment in resource-constrained UAVs and Internet-of-Drones environments. Formal security analysis confirms resistance to impersonation, replay, and forgery attacks, while experimental evaluation shows real-time feasibility, with the Registration Phase completing in approximately 0.842  ms and the Authentication Phase in 72.749  ms.
The rest of this paper is structured as follows: Section 2 provides an overview of related work. Section 3 introduces the cryptographic preliminaries. Section 4 and Section 5 describe the proposed PrivLocAuth model and the system protocol. Section 6 and Section 7 focus on the security analysis and experimental evaluation. Finally, Section 8 concludes the paper and highlights potential future research directions.

2. Related Work

Cross-domain UAV authentication has been extensively studied in civilian settings, primarily focusing on identity assurance, access control, and cryptographic robustness. These protocols often assume a centralized trust architecture or semi-trusted infrastructure [12], which may not be practical or secure in real-world deployments involving adversarial, disconnected, or bandwidth constrained domains. Early approaches largely relied on centralized Public Key Infrastructure (PKI) and Certificate Authorities (CAs) to manage inter- or local-domain trust relationships, requiring UAVs to maintain persistent connectivity with their home authorities or implicitly trust cross-domain infrastructure. Such assumptions are often infeasible in highly mobile, mission-critical scenarios where autonomy, resiliency, and privacy are essential.
To reduce dependency on centralized authorities, federated identity frameworks and token-based delegation schemes have been proposed to enable UAVs to carry cryptographic credentials across administrative domains [13,14]. Although these systems improve operational flexibility, they typically expose long-term identifiers or contextual metadata such as issuing domain, timestamps, or session tokens, which can be exploited by honest-but-curious servers or external adversaries to reconstruct UAV trajectories, correlate sessions, or infer mission objectives. Furthermore, these schemes generally lack explicit provisions for spatial privacy, making them vulnerable to geofence inference and trajectory profiling attacks. A different line of work has turned to blockchain-based cross-domain authentication. For example, a scheme combining consistent hashing with consortium blockchains was proposed to enhance lookup efficiency and scalability [15]. However, the reliance on blockchain consensus still introduces significant latency and overhead, unsuitable for UAVs with strict real-time requirements. Similarly, the AAMB protocol introduced a cross-domain authentication framework using dynamic accumulators and two-layer blockchains in IoMT [16]. While this improves revocation management and privacy, the multi-layer blockchain structure is resource-intensive and less practical for lightweight UAV platforms. Another recent study presented a blockchain and signature-based scheme leveraging Verifiable Credentials (VCs) [17]. Although this provides strong interoperability across-domains, it assumes stable connectivity for credential verification and does not address UAV-specific location privacy challenges.
To address privacy concerns, various location obfuscation techniques such as k-anonymity, dummy injection, and spatial cloaking have been introduced [18,19]. While effective against casual observers, these heuristics only offer probabilistic guarantees and are fragile under cumulative inference or traffic analysis. In contrast, cryptographic mechanisms grounded in ZKPs offer formal privacy guarantees and enable selective disclosure. Pedersen commitments, which are computationally binding and perfectly hiding, have been used to encode sensitive values such as geographic coordinates without revealing them, while supporting algebraic operations for proof composition.
Building on these primitives, Bulletproofs is a non-setup, non-interactive ZKP system [20] that avoids the need for a trusted setup, enabling efficient range proofs and geofence validation without leaking coordinate information. Their logarithmic proof size and fast verification make them particularly suitable for deployment in embedded systems like UAVs. However, prior ZKP-based UAV authentication schemes often depend on heavy weight zk-SNARK circuits or require centralized setup phases, limiting their applicability in dynamic, decentralized networks. Moreover, many fail to integrate privacy-preserving spatial validation with identity unlinkability, leaving location data exposed or binding it to persistent identifiers [21]. Complementary approaches based on Boneh–Boyen–Shacham (BBS) credentials [22], group signatures, or anonymous tokens provide unlinkable authentication and selective attribute disclosure, yet they do not natively incorporate geospatial constraints or allow UAVs to prove location compliance without compromising anonymity. The frameworks in [9,23] report an authentication latency of 68.92 ms, which is slightly lower than PrivLocAuth (72.749 ms), although PrivLocAuth provides a more lightweight design for UAV deployment. Unlike our prior ZAPS protocol [2], which uses zk-SNARKs for full flight path privacy in a single-domain setting, PrivLocAuth addresses cross-domain authentication and enables lightweight geofence compliance using Bulletproofs without trusted setup.
To the best of our knowledge, PrivLocAuth is the first lightweight cross-domain UAV authentication protocol that jointly achieves unlinkable identity validation and cryptographically sound location privacy without requiring continuous direct RA involvement for routine authentication. The RA remains online only for credential verification and revocation, while UAVs and CDSs operate efficiently across multiple domains. The protocol supports scalable authentication across mutually untrusted administrative domains and provides strong resistance against inference, correlation, and replay attacks. Unlike PKI-, token-, blockchain-, and existing zero-knowledge-only approaches, PrivLocAuth integrates elliptic curve cryptography with zero-knowledge range proofs to enable real-time operation in highly mobile IoD environments [24]. Its design ensures geofence compliance, session unlinkability, and decentralized trust enforcement through LDS-attested Bulletproof-based location commitments and credential-based authentication, without revealing UAV identities or exact coordinates. As summarized in Table 1, PrivLocAuth achieves a balanced trade-off between privacy, security, scalability, and computational efficiency, making it practical for deployment on resource-constrained UAV platforms.

3. Preliminaries

This section introduces the foundational cryptographic primitives and techniques that underpin the design and security analysis of our PrivLocAuth protocol [25]. We focus on ECC for efficient and lightweight public key operations, Pedersen Commitments for hiding and binding values, Schnorr Signatures for efficient and secure authentication, and Bulletproofs as a zero-knowledge proof system for proving range constraints without revealing underlying values. These tools collectively enable privacy-preserving authentication and data integrity within resource-constrained and trustless environments.

3.1. Elliptic Curve Cryptography (ECC)

ECC is a public-key cryptographic system that provides strong security using the algebraic structure of elliptic curves over finite fields, offering equivalent security to traditional methods like RSA but with significantly smaller key sizes, making it ideal for constrained environments such as IoT and UAV systems [26]. Mathematically, an elliptic curve E over a finite field F p (with p as a prime) is defined by the Weierstrass equation
y 2 x 3 + a x + b ( mod p ) ,
where constants a and b F p must satisfy the condition
Δ = 16 ( 4 a 3 + 27 b 2 ) 0 ( mod p )
to ensure the curve has no singularities. The set of points ( x , y ) that satisfy this equation, along with a special point at infinity O , forms an abelian group with a defined addition operation. Given two points P = ( x 1 , y 1 ) and Q = ( x 2 , y 2 ) , their sum R = P + Q = ( x 3 , y 3 ) is computed using slope λ , where
λ = y 2 y 1 x 2 x 1 mod p for P Q ,
and
λ = 3 x 1 2 + a 2 y 1 mod p for point doubling when P = Q .
The resulting coordinates are
x 3 = λ 2 x 1 x 2 mod p , y 3 = λ ( x 1 x 3 ) y 1 mod p .
ECC key generation involves choosing domain parameters ( p , a , b , G , n ) , selecting a private key d [ 1 , n 1 ] , and computing the corresponding public key Q = d G . The security of ECC hinges on the Elliptic Curve Discrete Logarithm Problem (ECDLP), which is the challenge of determining d given Q = d G for known Q and G, a problem for which no efficient algorithm is known, thereby forming the core of ECC’s cryptographic strength.

Elliptic Curve Discrete Logarithm Problem (ECDLP)

The security of ECC is based on the computational hardness of the ECDLP [27]. The problem is defined as follows:
Let E ( F p ) be an elliptic curve defined over a finite field F p , where p is a prime number. Let G E ( F p ) be a base point of prime order n, and let d [ 1 , n 1 ] be a scalar. Then compute: Q = d G . Given the elliptic curve E ( F p ) , the base point G, and the public point Q, the Elliptic Curve Discrete Logarithm Problem is to determine the unknown scalar d such that Q = d G . The operation d G refers to scalar multiplication, which consists of repeated point additions on the elliptic curve:
d G = G + G + + G d times
This problem is believed to be computationally infeasible for sufficiently large d and properly chosen curve parameters. Unlike the discrete logarithm problem in finite fields (as used in traditional Diffie–Hellman), no sub-exponential-time algorithm is currently known for solving ECDLP on general elliptic curves.
Therefore, the intractability of solving the equation Q = d G underpins the security of ECC. Even with key sizes as small as 256 bits, ECC provides a level of security comparable to 3072-bit RSA, making it especially suitable for resource-limited environments such as mobile devices, smart cards, and IoT.

3.2. Pedersen Commitments

The Pedersen commitment is a cryptographic commitment scheme that allows a sender to commit to a value while keeping it hidden (hiding) and ensuring that it cannot be changed later (binding) [28]. It is widely used in privacy-preserving protocols, such as zero-knowledge proofs, confidential transactions, and secure voting systems. Pedersen commitments are computationally binding under the Discrete Logarithm Assumption, perfectly hiding—meaning the commitment reveals no information about the committed value—and homomorphic, supporting operations on committed values without revealing them.
Let G be a cyclic group of prime order p (e.g., an elliptic curve group), and let g , h G be two generators such that the discrete logarithm log g ( h ) is unknown. To commit to a secret value m Z p * using a random blinding factor n Z p * , the Pedersen commitment C is defined as
C = g m h n mod p
where m is the message (the value to commit to), n is the random nonce or blinding factor, g and h are fixed generators of the group G with unknown discrete log relationship, and C is the commitment. Since n is randomly chosen and h n masks g m , the commitment does not leak any information about m.
Under the Discrete Logarithm Assumption, it is computationally infeasible to find distinct pairs ( m , n ) ( m , n ) such that
g m h n = g m h n mod p
ensuring binding. Furthermore, Pedersen commitments are homomorphic: given two commitments C 1 = g m 1 h n 1 and C 2 = g m 2 h n 2 their product
C 1 · C 2 = g m 1 + m 2 h n 1 + n 2
is a valid commitment to m 1 + m 2 using randomness n 1 + n 2 .

3.3. Zero-Knowledge Proofs Systems

A ZKP [29,30] is a cryptographic protocol in which a prover convinces a verifier that a statement is true (e.g., “location x lies within the range [ x min , x max ] ”) without revealing any information beyond the validity of the statement itself. ZKPs ensure three core properties: completeness (honest provers can always convince verifiers of true statements), soundness (false statements cannot be convincingly faked by computationally bounded adversaries), and zero-knowledge (no private data such as x or its blinding factor n x is disclosed). While traditional ZKPs, like Schnorr identification, require interaction between prover and verifier, the proposed UAV protocol uses Bulletproofs to transform range proofs into non-interactive zero-knowledge proofs via the Fiat–Shamir heuristic. This allows UAVs to generate a single proof string π x that demonstrates the existence of values ( x , n x ) such that C x = x · G + n x · H and x [ x min , x max ] , without revealing x or n x . The main advantage of Bulletproofs in this setting is their elimination of interaction delays and minimization of bandwidth—both of which are critical for UAVs operating in latency-sensitive environments such as disaster response scenarios.

Bulletproofs (Range Proofs)

Bulletproofs are non-interactive zero-knowledge (NIZK) protocols that allow short, O ( log n ) -sized proofs over arithmetic circuits without requiring a trusted setup [20]. They are primarily used for two purposes: (1) range proofs, which allow a prover to convince a verifier that a committed value v lies within a specified interval [ a , b ] without revealing v; and (2) inner-product proofs, which verify algebraic relations over hidden vectors.
In the Bulletproof range-proof construction, the prover encodes the committed value using a binary vector representation. Let a L Z p n denote the binary encoding vector, and define a R = a L 1 , where 1 is the all-ones vector. To enforce that each component is binary, the protocol applies the constraint a L a R = 0 , where ∘ denotes the Hadamard (element-wise) product defined by ( x y ) i = x i y i . This constraint guarantees a L , i ( a L , i 1 ) = 0 for every index i, ensuring that each component lies in { 0 , 1 } . The prover next samples random blinding vectors s L , s R Z p n and a scalar α Z p , and computes a vector Pedersen commitment
A = a L , G + a R , H + α U ,
where G and H are publicly fixed, independent generator vectors in the elliptic-curve group, and U is an additional public generator. These generators ensure binding and hiding properties of the commitment. To remove interaction, the protocol applies the Fiat–Shamir transform: public challenges are deterministically derived by hashing the protocol transcript. These challenges are used to form blinded vectors that encode the arithmetic constraints of the range proof. The proof is then reduced to an inner-product relation t = l , r , which is proven using a logarithmic inner-product argument.
The resulting proof transcript is
π BP = { L i , R i } i = 1 log n , a , b ,
where L i and R i are commitment elements generated during recursive folding of the inner-product proof, and a , b are final scalar values satisfying the inner-product constraint. The verifier recomputes the corresponding commitments using the same Fiat–Shamir challenges and accepts if consistency holds. The resulting proof is perfectly complete and honest-verifier zero-knowledge, and enjoys computational witness-extended emulation under the discrete logarithm assumption. Its size is only 2 log n + 9 group elements and five scalars, making it a compact, trust-free primitive suitable for privacy-preserving computations on resource-constrained platforms such as UAVs.

3.4. Schnorr Signatures

Schnorr signatures [31] are a digital signature scheme known for their simplicity, efficiency, and security, relying on the hardness of the discrete logarithm problem in a finite cyclic group. Let G be a cyclic group of prime order p with generator g. The signer selects a secret key x Z p * and computes the public key Y = g x mod p . To sign a message m, the signer chooses a random nonce k Z p * , computes the commitment R = g k mod p , and then computes the challenge e = H ( R m ) using a cryptographic hash function H. The response is computed as s = k + e x mod p , and the resulting signature is the pair ( e , s ) . To verify the signature, the verifier recomputes R = g s Y e mod p , calculates e = H ( R m ) , and accepts the signature if e = e . Schnorr signatures are compact, provably secure in the random oracle model, and support aggregation, making them suitable for applications like multi-signatures in blockchain protocols.

4. System Model of Proposed Protocol

This section presents the system architecture of the proposed cross-domain UAV authentication protocol, including the participating entities, their roles, trust assumptions, and communication model. It also provides a brief operational perspective to illustrate how these components interact during a multi-domain UAV mission under zero-knowledge-based location privacy.

4.1. Main Entities

As illustrated in Figure 1, the system consists of four core entities interacting in a decentralized yet privacy-preserving authentication architecture:
  • Registration Authority (RA): A trusted, centralized authority responsible for registering UAVs and issuing credentials ( Cred d ) using its secret key V r . It defines the cryptographic system parameters, issues Schnorr-signed UAV credentials, and enables secure cross-domain authentication while preserving UAV anonymity.
  • Local Domain Server (LDS): A domain-local authority that manages UAVs within its domain, verifies Pedersen commitments and zero-knowledge Bulletproof range proofs, and issues short-lived Schnorr-signed attestations confirming that UAV locations are valid and fresh without revealing exact coordinates.
  • Cross-Domain Server (CDS): A domain visited by the UAV. It authenticates visiting UAVs using their RA-issued credentials and LDS-attested location proofs, without learning the UAV’s real identity or exact location. The CDS relies on RA online verification for credential legitimacy and revocation enforcement, and on LDS-issued attestations for geofence compliance.
  • UAV (Drone): A mobile autonomous entity seeking authenticated access to resources or airspace in foreign domains. It holds a private ECC key V d and credential ( Cred d ), and generates Pedersen commitments and Bulletproof range proofs to prove geofence compliance while preserving location and identity privacy.
Figure 1. Network model of the PrivLocAuth protocol.
Figure 1. Network model of the PrivLocAuth protocol.
Electronics 15 01243 g001

4.2. Operational Context

To clarify the practical operation of the PrivLocAuth protocol, we describe a representative UAV mission spanning multiple administrative domains. A UAV D d is deployed for a long-range task and traverses several regions, each governed by a distinct CDS enforcing its own geofence policy. Prior to deployment, the UAV completes a one-time registration with the RA, during which it generates an ECC key pair and obtains a Schnorr-signed credential Cred d . This credential is securely stored on the UAV and reused throughout the mission for cross-domain authentication.
During cross-domain authentication, the UAV initiates contact with the corresponding CDS using its stored credential and freshly generated session nonces. The CDS may forward the received credential to the RA only when necessary, for instance, to validate the UAV’s credential or check its revocation status. The RA then performs these checks on-demand rather than being continuously involved, ensuring that UAVs remain operational even when the RA is temporarily unavailable. This approach allows compromised or misbehaving UAVs to be promptly denied access without requiring the RA to be online for every authentication session. Once legitimacy is confirmed through these on-demand checks, the CDS completes the authentication process and enforces its domain-specific geofence policy. It introduces an availability dependency on the RA. If the RA becomes temporarily unreachable, cross-domain authentication cannot be completed. As the UAV enters a foreign domain, it generates fresh Pedersen commitments to its current location and constructs Bulletproof range proofs with respect to the CDS-defined geofence constraints. These commitments and proofs are submitted to the UAV’s home LDS, which verifies their correctness and freshness and issues a short-lived Schnorr-signed attestation. Using these LDS-attested commitments, the UAV constructs Bulletproof range proofs demonstrating compliance with the CDS-defined geofence without revealing its exact location. The CDS then verifies the UAV’s credential together with the LDS-issued attestation over the Bulletproof-verified commitments, ensuring that the UAV is both legitimate and operating within the authorized area while preserving location privacy.
This process is repeated independently for each CDS encountered during flight. Each authentication session employs fresh nonces, session keys, and LDS-attested location commitments, ensuring unlinkability across domains and preventing cross-session correlation. Geofence compliance is enforced cryptographically, and precise location information is never disclosed. In summary, the RA participates only during registration and for on-demand revocation checks, rather than being continuously consulted. Meanwhile, the UAV remains fully operational under temporary network delays or bandwidth constraints, with location correctness and freshness ensured locally through the LDS. This design highlights that selective RA involvement enables strong security guarantees while maintaining practical and efficient cross-domain authentication under realistic network conditions.

4.3. Assumptions

The design of the PrivLocAuth protocol relies on a set of practical assumptions aligned with its security goals and deployment model.
The RA is assumed to be trusted for system setup, credential issuance, and UAV identity management. The RA remains online and reachable during both registration and authentication phases and is consulted for verifying the legitimacy of UAV credentials, checking revocation status, detecting misbehavior, and performing administrative auditing. This ensures that only authorized UAVs can participate in cross-domain authentication while enabling immediate revocation of compromised UAVs. Routine cryptographic operations, including session key establishment, Pedersen commitment generation, and zero-knowledge proof construction, do not require direct RA interaction, as the UAV and CDS rely on previously issued RA-signed credentials; however, credential validation and revocation checks are performed online by the RA during authentication.
CDSs are modeled as honest-but-curious entities. A CDS follows the protocol specification correctly, including credential verification, implicit authenticated ECDH-based key establishment, zero-knowledge proof validation via LDS attestations, and revocation enforcement, but may attempt to infer additional information from received messages or stored transcripts. The protocol is designed to limit such inference by ensuring that neither the UAV’s real identity nor its exact location is disclosed during authentication.
UAVs are assumed to execute the protocol correctly when uncompromised and to generate fresh Pedersen commitments and corresponding Bulletproof range proofs for their current location in each authentication session. Real-world GPS coordinates are treated as signed and bounded values represented in fixed-point format. Prior to cryptographic use, latitude and longitude values are scaled by a public precision factor and converted into signed integers, then injectively mapped into a non-negative domain using a public offset to ensure compatibility with finite-field arithmetic. Location values are never used directly in elliptic-curve group operations, but only within commitments and zero-knowledge range or geofence verification proofs. UAVs are not assumed to be tamper-resistant; physical capture, key extraction, and compromise of stored credentials are considered in the security analysis.
All UAV–CDS communications are protected using authenticated encryption with session keys established via implicitly authenticated ECDH key exchange and derived using a standard key derivation function. Session keys are bound to fresh nonces and timestamps to ensure session uniqueness, freshness, and replay protection. The authenticated ECDH exchange guarantees mutual authentication and resistance against man-in-the-middle attacks under the hardness assumption of the ECDLP. In the event of UAV device compromise, previously established session keys remain protected provided that the long-term private keys are not exposed; however, ongoing or future sessions may be affected until revocation is enforced by the RA.
Entities are assumed to maintain loosely synchronized clocks within an acceptable tolerance window to support timestamp-based freshness checks. The adversary is assumed to have full control over the communication channel, including the ability to eavesdrop, replay, delay, and modify messages.
Finally, the protocol assumes standard cryptographic hardness assumptions, including the intractability of the elliptic-curve discrete logarithm problem, the security of authenticated ECDH key exchange, and the collision resistance of the employed hash functions. Performance assumptions are based on software-based cryptographic libraries running on general-purpose processors rather than specialized UAV hardware accelerators.

4.4. Security Requirements

To ensure secure and privacy-preserving cross-domain authentication for UAVs, the proposed PrivLocAuth protocol must satisfy the following requirements:
  • Robust UAV Authentication: Only UAVs possessing a valid RA-issued credential Cred d and the corresponding private key V d can successfully authenticate to a CDS. Each authentication session is bound to fresh nonces ( n 1 , n 2 ) and a session key established via an implicit ECDH-based authenticated key agreement and derived using HKDF. The nonces ensure freshness and replay protection but do not serve as keying material.
  • Location Privacy Preservation: Raw GPS coordinates are never transmitted. The UAV encodes its current location into fresh Pedersen commitments ( C x , C y ) per session and generates zero-knowledge Bulletproof range proofs to demonstrate geofence compliance. These commitments and proofs are attested by the LDS via a short-lived Schnorr signature, ensuring that location data remains hidden even if adversaries access stored commitments, credentials, or protocol transcripts.
  • Geofence Soundness Enforcement: Each UAV proves in zero-knowledge that its committed location lies within the authorized geofence R = ( X min , X max , Y min , Y max ) . The soundness of Bulletproofs ensures that out-of-range coordinates cannot be falsely verified. The LDS verifies the Bulletproof range proofs and commitment freshness and issues a signed attestation, while the CDS verifies the validity of the LDS-issued Schnorr attestation before granting access.
  • Replay Attack Resistance: Each authentication session is protected using session-specific nonces ( n 1 , n 2 ) , timestamps ( T d , T c , T l ) , and a server-side replay cache. The CDS rejects duplicated nonces and stale timestamps within the defined freshness window Δ T f , ensuring that replayed or delayed messages cannot be accepted. Even in the presence of temporary clock drift, GPS loss, or local resets, session replay remains infeasible.
  • Unforgeability Under ECDLP: All credentials, signatures, and cryptographic commitments rely on the computational hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Forging RA-issued credentials or LDS attestations, or generating accepting Bulletproof proofs for out-of-range values without the corresponding witnesses, is infeasible under standard elliptic-curve hardness and zero-knowledge proof soundness assumptions.
  • Session Unlinkability: Each UAV generates fresh Pedersen commitments and Bulletproof proofs for every authentication session, and the LDS issues short-lived attestations bound only to the current session. Public keys P d may be updated over time under RA control, while the RA internally maps them to the persistent identity I D d . As a result, multiple protocol sessions cannot be linked to infer UAV movement patterns or operational behavior.
  • Side-Channel Mitigations: The protocol employs randomized nonces and ephemeral elliptic-curve computations to introduce variability in cryptographic operations. While no formal side-channel model or constant-time implementation is assumed, timing analysis was performed using Python-based cryptographic libraries to evaluate computational overhead. This analysis provides an initial assessment of protocol performance and timing characteristics but does not claim full resistance against timing or power-analysis attacks on UAV hardware.
  • Revocation Compliance: The CDS validates UAV credentials Cred d and checks the revocation status of the presented credential via the online RA, with optional temporary caching of recent revocation outcomes to improve efficiency. Location proofs are accepted only if attested by the LDS and valid for the current session. Any revoked or compromised UAV attempting to authenticate is rejected, and the corresponding credential or public-key reference may be temporarily recorded within replay or revocation caches without storing persistent identity or location information, thereby preserving unlinkability, location privacy, and geofence enforcement.

5. Proposed Protocol

The proposed PrivLocAuth protocol comprises four core phases: Setup, Registration, Cross-Domain Authentication, and Revocation. During the Setup and Registration phase, RA initializes the ECC system parameters and generates its signing key pair. Each UAV independently generates its own ECC private public key pair and submits its public key to the RA for enrollment. The RA issues a verifiable credential by digitally signing the UAV’s public key using a Schnorr signature, thereby enabling anonymous yet authenticated participation without revealing sensitive attributes.
In the Cross-Domain Authentication phase, a UAV seeking access to a foreign CDS initiates the protocol by transmitting its credential along with a freshness nonce and timestamp, encrypted under the CDS’s public key. The CDS forwards the received credential to the online RA for legitimacy and revocation verification, and performs replay protection through nonce and timestamp checks. Both parties then derive a shared session key using an elliptic-curve Diffie–Hellman shared secret expanded via HKDF with the exchanged nonces.
Subsequently, the UAV submits Pedersen commitments together with corresponding Bulletproof-based range proofs of its current geographic coordinates to its home LDS, which verifies the proofs and issues a short-lived Schnorr signature attesting to their correctness and freshness. The UAV then constructs Bulletproof-based zero-knowledge range proofs to demonstrate that its committed location lies within a CDS-defined geofenced region. These proofs are transmitted securely under the established session key, allowing the CDS to verify geofence compliance via validation of the LDS-issued Schnorr attestation, without learning the UAV’s exact location or private keys. Upon successful verification of the credential, session freshness, and range proofs, the CDS grants access.
In the revocation phase, the CDS checks the legitimacy and revocation status of the UAV’s credential by querying the online RA. The CDS also ensures that the LDS-attested commitments and Bulletproof range proofs are valid and current. If the credential is found to be revoked, expired, or tampered with, or if the LDS-issued location attestation or its associated range proofs fail verification, the session is immediately terminated and access is denied. Recent revocation outcomes for the presented credential may be cached locally by the CDS only within the replay protection window, without storing persistent identifiers or location-related information, thereby preventing repeated unauthorized interactions while preserving the privacy and unlinkability of compliant UAVs. The notations utilized in the PrivLocAuth protocol are defined in Table 2.

5.1. Setup Phase

In the initial step of the setup phase, the RA establishes the foundational cryptographic parameters for the protocol. The RA selects a secure, widely adopted elliptic curve defining a cyclic group G of prime order p, which underpins all subsequent cryptographic operations.
Two independent generator points are chosen on this curve: G, used for public key generation and digital signatures, and H, used exclusively for constructing Pedersen commitments. The independence of these generators ensures the security of the commitment scheme and prevents discrete-logarithm correlation attacks.
The RA then generates a single long-term asymmetric key pair consisting of a private key V r Z p * , kept secret, and a public key P r = V r · G , which is made publicly available. This key pair is used to issue and verify UAV credentials via Schnorr signatures, without requiring per-UAV RA key material.
Finally, the RA publishes the global system parameters ( Curve , G , H , P r ) to all participating UAVs, LDSs, and CDSs. Each UAV possesses a long-term elliptic-curve key pair ( V d , P d ) that is registered with the RA during enrollment and bound to the UAV’s real identity I D d  only within the RA’s secure database. The identity I D d is never disclosed during authentication; instead, revocation and legitimacy are enforced through online RA verification of the presented credential. This design enables cross-session unlinkability, scalable revocation, and privacy-preserving cross-domain authentication.

5.2. UAV Registration with RA

As illustrated in Figure 2, the UAV registration phase establishes a long-term anonymous credential that enables future cross-domain authentication without disclosing the UAV’s real identity.
Initially, the UAV D d locally generates a random private key V d Z p * and computes the corresponding elliptic-curve public key P d = V d · G , where G denotes the system-wide curve generator. The UAV then constructs a registration message M d = ( I D d     P d ) , where I D d represents the UAV’s real identity, known exclusively to the Registration Authority (RA), and transmits M d to the RA over a secure channel.
Upon receiving the registration request, the RA verifies the legitimacy of I D d using administrative or out-of-band mechanisms and checks the validity of the submitted public key P d . The RA then stores the registration record, creating a persistent binding between the UAV’s real identity and its public key. This design allows the RA to associate multiple public keys with the same UAV identity over time, thereby supporting key updates, mobility, accountability, and auditability.
The RA maintains a long-term Schnorr signing key pair ( V r , P r ) , generated during the system setup phase. Using its private key V r , the RA issues an anonymous registration credential by computing a Schnorr signature over the UAV’s public key Cred d = SchnorrSign V r ( P d ) . The credential Cred d enables the UAV to authenticate itself in future protocol sessions without revealing I D d , while the RA retains the identity–public key mapping internally for accountability and revocation purposes.
The RA returns the issued credential to the UAV, which securely stores Cred d for subsequent cross-domain authentication. No location information is disclosed during the registration phase; the RA only issues the long-term credential and maintains the identity binding. During cross-domain authentication, the RA remains online to validate presented credentials and enforce revocation in real time, ensuring secure and scalable operation across multiple administrative domains. The pseudocode is shown in Algorithm 1.
Algorithm 1: UAV Registration Phase.
Require: 
UAV UAV d , Registration Authority RA
Ensure: 
Registration credential C r e d d securely stored at UAV d
    1:
procedure UAV_REGISTRATION( UAV d , RA )
    2:
     UAV d selects V d Z p *                    ▹ UAV private key
    3:
     P d V d · G                           ▹ UAV public key
    4:
     M d ( I D d         P d )                    ▹ Registration message
    5:
     UAV d RA : M d
    6:
     RA retrieves its long-term key pair ( V r , P r )       ▹ Established during setup
    7:
     RA verifies the legitimacy of I D d   ▹ Administrative or out-of-band verification
    8:
     RA verifies the validity of P d                ▹ Curve and format check
    9:
     RA stores M d             ▹ Persistent identity–public key mapping
  10:
     C r e d d SchnorrSign V r ( P d )           ▹ RA-issued anonymous credential
  11:
     RA UAV d : { C r e d d }
  12:
     UAV d securely stores C r e d d
  13:
end procedure

5.3. Cross-Domain Authentication and Revocation

As illustrated in Figure 3 and Algorithm 2, in the cross-domain authentication phase, a registered UAV D d authenticates to a cross-domain server C D S c . During this process, it proves, in a privacy-preserving manner, that it is operating within an authorized geofence region. This phase integrates mutual authentication, location compliance verification, replay protection, and revocation enforcement into a single protocol flow.
The authentication begins with the UAV generating a fresh random nonce n 1 and a local timestamp T d . The UAV retrieves its stored credential C r e d d and the public key P c of the cross-domain server, and constructs the authentication request A u t h d = Enc P c ( P d     n 1     C r e d d     T d ) , which is transmitted to C D S c . Upon receiving the message, the CDS decrypts it using its private key V c , records its current timestamp T c , and verifies freshness by checking | T c T d |     Δ T f . The CDS then performs replay protection by checking whether the nonce n 1 already exists in its replay cache within the window Δ T r p . If a replay is detected, the request is immediately rejected; if the nonce is fresh, the CDS forwards the received credential C r e d d to the online RA for legitimacy verification. Using its registration database, the RA verifies the validity of C r e d d , checks its revocation status, and confirms that it corresponds to a registered UAV. The authentication is rejected if the credential is invalid or revoked.
After receiving a positive validation response from the RA, the CDS generates a fresh nonce n 2 , updates its timestamp T c , and determines the authorized geofence R = [ X min , X max , Y min , Y max ] according to its access control policy, then sends a challenge message A u t h c = Enc P d ( P c     R     n 2     T c ) to the UAV.
Algorithm 2: Cross-Domain UAV Authentication and Geofence Verification
Require: 
Registered UAV UAV d , Cross-Domain Server CDS c , Home LDS
Ensure: 
Access Granted or Rejected
    1:
procedure CrossDomainAuth( UAV d , CDS c )
Phase 1: UAV → CDS Authentication Request
    2:
     UAV d selects n 1 Z p * and timestamp T d
    3:
    Retrieve C r e d d and CDS public key P c
    4:
     A u t h d Enc P c ( P d     n 1     C r e d d     T d )
    5:
     UAV d CDS c : { A u t h d }
Phase 2: CDS Validation and Challenge
    6:
     ( P d , n 1 , C r e d d , T d ) Dec V c ( A u t h d )
    7:
     T c CurrentTimestamp ( )
    8:
    if  | T c T d |   > Δ   T f  then
    9:
        return Reject
  10:
    end if
  11:
    if  n 1 exists in ReplayCache within Δ T r p  then
  12:
        return Reject                           ▹ Replay detected
  13:
        Verifies C r e d d through the RA
  14:
    end if
  15:
    Select n 2 Z p *
  16:
    Store { P d , n 1 , n 2 , T c } in ReplayCache
  17:
    Generate geofence R = [ X min , X max , Y min , Y max ]
  18:
     A u t h c Enc P d ( P c     R     n 2     T c )
  19:
     CDS c UAV d : { A u t h c }
Phase 3: UAV Proof Generation and LDS Attestation
  20:
     ( P c , R , n 2 , T c ) Dec V d ( A u t h c )
  21:
     T d CurrentTimestamp ( )
  22:
    if  | T d T c |   >   Δ T f  then
  23:
        return Reject
  24:
    end if
  25:
    if  n 2 exists for P c within Δ T r p  then
  26:
        return Reject                           ▹ Replay detected
  27:
    end if
  28:
     K d V d · P c                               ▹ UAV Shared key
  29:
    Derive session key S K d , c HKDF ( K d , n 1 , n 2 )                 ▹ UAV Session key
  30:
    Obtain current location ( x , y ) and select blinds ( n x , n y )
  31:
     C x x · G + n x · H
  32:
     C y y · G + n y · H
  33:
     π x BulletproofGen ( C x , [ X min , X max ] )
  34:
     π y BulletproofGen ( C y , [ Y min , Y max ] )
  35:
    Send ( K d     C x     C y     π x     π y     R ) to LDS
  36:
    LDS verifies π x , π y , infers coarse location ( x l , y l ) , records T l
  37:
    LDS generates Cred l SchnorrSign l ( K d     C x     C y     π x     π y     R     T l )
  38:
     UAV d receives LDS attestation C r e d l
  39:
     A u t h d , c Enc S K d , c ( Cred l     T d )
  40:
     UAV d CDS c : { A u t h d , c }
Phase 4: CDS Verification and Decision
  41:
     K c V c · P d                             ▹ CDS Shared key
  42:
    Derive session key S K c , d HKDF ( K c , n 1 , n 2 )               ▹ CDS Session key
  43:
     ( Cred l , T d ) Dec S K c , d ( A u t h d , c )
  44:
    if  | T c T d |   >   Δ T f  then
  45:
        return Reject
  46:
    end if
  47:
    Verify LDS Schnorr signature C r e d l
  48:
    if signature invalid then
  49:
        return Reject
  50:
         BulletproofVer ( C x , π x )
  51:
         BulletproofVer ( C y , π y )
  52:
    end if
  53:
    return Grant Access
  54:
end procedure
Upon receiving the challenge, the UAV decrypts it using its private key V d , verifies freshness by checking | T d T c |     Δ T f , and ensures that the nonce n 2 has not been reused for the same server within the replay window. If the checks succeed, the UAV derives an elliptic-curve Diffie–Hellman shared secret K d = V d · P c , which is then expanded into the session key S K d , c = HKDF ( K d , n 1 , n 2 ) . The exchanged nonces n 1 and n 2 are used as HKDF context inputs to bind the session key to the current protocol instance and ensure resistance against replay and key-compromise impersonation attacks.
To prove compliance with the issued geofence without revealing its exact location, the UAV determines its current coordinates ( x , y ) and selects random blinding factors n x and n y . It computes Pedersen commitments C x = x · G + n x · H , C y = y · G + n y · H , where G is the elliptic-curve generator and H is an independent generator with no known discrete logarithm relationship to G. Using the geofence bounds R, the UAV constructs zero-knowledge Bulletproof range proofs π x = BulletproofGen C x , [ X min , X max ] , π y = BulletproofGen C y , [ Y min , Y max ] , which demonstrate that the committed coordinates lie within the authorized region.
The UAV submits the tuple ( K d     C x     C y     π x     π y     R ) to its local domain server L D S s for location attestation. The inclusion of the shared secret K d cryptographically binds the location evidence to the authenticated UAV–CDS session. The LDS verifies the correctness of the Bulletproof range proofs and infers a coarse-grained estimate of the UAV’s location ( x l , y l ) using local observation mechanisms such as wireless channel characteristics. Without learning the exact committed coordinates, the LDS checks whether the inferred location is consistent with the geofence R. If the checks succeed, the LDS records the current timestamp T l and issues a short-lived location attestation C r e d l = SchnorrSign l K d     C x     C y     π x     π y     R     T l . Finally, the UAV encrypts the LDS-signed attestation together with its timestamp as A u t h d , c = Enc S K d , c C r e d l     T d and transmits it to the CDS. Upon reception, the CDS derives the shared secret K c = V c · P d , and computes the corresponding session key S K c , d = HKDF ( K c , n 1 , n 2 ) . Using this session key, the CDS decrypts the received ciphertext to recover ( C r e d l , T d ) = Dec S K c , d ( A u t h d , c ) . The CDS then performs a freshness check by verifying that the timestamp difference satisfies | T c T d |     Δ T f . If this condition fails, the authentication request is rejected to prevent replay attacks.
Next, the CDS validates the LDS Schnorr signature contained in C r e d l to confirm the integrity and origin of the geofence attestation. Upon successful signature verification, the CDS verifies the zero-knowledge range proofs by executing BulletproofVer ( C x , π x ) and BulletproofVer ( C y , π y ) , thereby confirming that the UAV’s committed coordinates satisfy the authorized geofence constraints without revealing their exact values.
If all verification steps succeed, access is granted. The shared key K d is included in the LDS submission solely as a session-binding identifier that uniquely associates the attestation with the current UAV–CDS interaction. Its disclosure to the LDS does not compromise confidentiality, since K d is never used directly for encryption and the operational session key S K d , c remains known only to the UAV and CDS. All public-key encryptions Enc P i ( · ) are instantiated using an ECIES-style construction based on ephemeral elliptic-curve Diffie–Hellman key agreement, with session keys derived using HKDF and protected via AEAD primitives that ensure confidentiality and integrity. Freshness, replay resistance, and session binding are jointly enforced through timestamps, replay caches, nonces, and LDS-issued Schnorr attestations.
During the revocation phase, the RA processes requests to revoke UAV identities or public keys and updates its internal revocation list. This ensures that compromised or unauthorized UAVs are blocked from future protocol sessions, without involving the CDS or disclosing location information.
During authentication, the CDS verifies UAV legitimacy and the freshness of location evidence. It forwards the RA-issued credential Cred d to the RA, which checks the credential’s validity, confirms the binding between I D d and P d , and verifies the revocation status in real time. The UAV’s identity remains hidden from the CDS.
If the credential is invalid or the UAV is revoked, the CDS immediately terminates the session. Additionally, the CDS verifies per-session Pedersen commitments and Bulletproof-based location proofs, ensuring timestamps are fresh and evidence is not replayed.
This combination of RA-managed revocation and CDS-enforced session validation prevents unauthorized UAVs from accessing cross-domain services while preserving location privacy, unlinkability, and protocol scalability.

6. Security Analysis

In this section, we thoroughly analyze the privacy and security properties of the proposed PrivLocAuth protocol and discuss the associated security considerations.

6.1. Adversary Model

In the proposed PrivLocAuth framework, the adversary A is modeled as a probabilistic polynomial-time (PPT) entity with full control over the public communication channels between UAVs, CDSs, and the RA. The adversary can intercept, modify, replay, or inject messages but is computationally bounded under the hardness assumptions of the ECDLP, the security of ephemeral ECDH key exchange authenticated via Schnorr-based credentials, the collision resistance of cryptographic hash functions, and the soundness and Bulletproof zero-knowledge proofs.
Several realistic adversarial scenarios are considered. In a passive setting, eavesdroppers on UAV–CDS or UAV–LDS communications may attempt to infer sensitive information, such as UAV identity, operational domain, or geographic coordinates, from intercepted ciphertexts, commitments, or proof transcripts. In an active setting, A may attempt to impersonate legitimate UAVs or CDSs, inject forged messages, replay previously transmitted authentication data, or mount man-in-the-middle attacks by manipulating protocol flows. The model also includes honest-but-curious CDSs that follow the protocol specification correctly but attempt to extract hidden information, such as the UAV’s location, by analyzing stored transcripts and commitments. Malicious CDS behavior, including protocol deviation or impersonation, is covered under the active adversary model.
The primary objectives of A are to impersonate legitimate entities, forge or replay authentication messages, compromise session keys, or infer UAV identity or location information. The proposed PrivLocAuth protocol mitigates these threats through authenticated ephemeral ECDH key exchange, Schnorr-based credential verification, Pedersen commitments, and Bulletproof range proofs. Each authentication session establishes a fresh session key derived from an ephemeral ECDH shared secret and bound to session-specific nonces and timestamps via a standard key derivation function. This design ensures message confidentiality, integrity, and unlinkability, even under active adversarial control of the communication channel.
The PrivLocAuth protocol relies on loose time synchronization between UAVs and CDSs to enforce session freshness and replay resistance, following the time-step validation principles defined in TOTP [32]. Each authentication exchange includes a timestamp that is validated upon receipt, and a session is accepted only if the observed time deviation remains within a predefined tolerance window Δ T , set to approximately 30 s, consistent with standard time-based one-time password validation windows [32]. This threshold reflects a conservative upper bound that accounts for typical wireless transmission delays, GPS timing inaccuracies, and clock drift commonly observed in embedded UAV platforms. The confidentiality and integrity guarantees of PrivLocAuth for session data rely on the IND-CCA2 security of standard AEAD encryption primitives used in the implementation, rather than on any custom encryption constructions.
The security guarantees of the protocol are not critically affected by minor violations of the freshness bound: short-lived network latency variations or limited clock drift may lead to rejection of an individual authentication attempt but do not enable replay, impersonation, or session compromise. Freshness verification is reinforced through the combined use of authenticated ephemeral ECDH key material, session-specific nonces, and timestamps, ensuring that stale, duplicated, or delayed messages cannot be reused successfully, even under partial temporal desynchronization.
The protocol assumes a trusted RA responsible for credential issuance and real-time revocation enforcement, secure storage of cryptographic material on UAV platforms, and the computational hardness of the underlying elliptic-curve and zero-knowledge proof primitives. The RA functions as a logically centralized trust and availability component within the system. While it guarantees immediate revocation effectiveness and consistent credential validation across administrative domains, its temporary unavailability may suspend the initiation of new cross-domain authentication sessions, although previously established secure sessions remain unaffected.
Extreme adversarial scenarios, such as physical capture of a UAV or simultaneous compromise of both the RA and a CDS, may temporarily impact anonymity or trust assumptions until revocation mechanisms are enforced. However, such events do not undermine the correctness or cryptographic soundness of the authentication process itself. This architectural choice reflects a deliberate prioritization of strong revocation guarantees, accountability, and lightweight system design over fully distributed trust architectures. Within these clearly defined trust boundaries, the proposed PrivLocAuth protocol achieves strong resistance to impersonation, replay attacks, man-in-the-middle attacks, and privacy-compromising inference.

6.2. Formal Game-Based Security Proof

Security properties are formalized using standard game-based definitions. Let λ denote the security parameter, negl ( λ ) a negligible function, and q O the maximum number of queries to oracle O . All probabilities are explicitly parameterized by λ .

Oracle Definitions

The adversary A is modeled as a PPT algorithm with access to the following oracles:
  • O Register ( ID ) : Registers UAV ID and returns its public key P ID and associated credential.
  • O Corrupt ( ID ) : Returns the long-term private key V ID and credential Cred ID .
  • O Send ( ID , msg ) : Delivers message msg to a protocol participant and returns the resulting response.
  • O Reveal ( sid ) : Reveals the session key for session identifier sid .
  • O Authenticate ( ID , CDS ) : Executes the authentication protocol between UAV ID and cross-domain server CDS and returns the transcript.

Trust Model

CDSs are honest-but-curious: they follow the protocol correctly but may attempt to infer UAV identities or locations from observed transcripts.

Hardness Assumptions

Security relies on the following standard cryptographic assumptions:
1.
ECDLP. The Elliptic Curve Discrete Logarithm Problem is hard; any PPT adversary running in time t has advantage Adv ECDLP ( t ) .
2.
Schnorr EUF-CMA. Schnorr signatures are existentially unforgeable under chosen-message attacks; advantage denoted Adv EUF - CMA ( t , q s , q h ) .
3.
Bulletproof Soundness. The range proof system is computationally sound with error ϵ BP ( λ ) .
4.
Bulletproof Zero-Knowledge. The proofs reveal no additional information; simulation error ϵ ZK ( λ ) .
5.
DDH. The Decisional Diffie–Hellman problem is hard with advantage Adv DDH ( t ) .
6.
ECIES IND-CCA. ECIES encryption resists adaptive chosen-ciphertext attacks with advantage Adv IND - CCA ( t , q d ) .
7.
Pedersen Commitment Hiding. Commitments are computationally hiding under the discrete logarithm assumption.

6.2.1. Security Games and Theorems

Game 1: Authentication Unforgeability
This game models the adversary’s ability to forge a valid authentication transcript for an honest UAV.
  • Setup: The challenger runs Setup ( 1 λ ) to generate system parameters and simulates all oracles.
  • Adversarial Goal:  A outputs a transcript
    T = ( Cred , C x , C y , π x , π y , R , T ) ,
    representing a forged location-authentication message. A wins if:
    • Verify ( Cred , p k LDS ) = 1 ;
    • BulletproofVer ( C x , π x ) = 1 and BulletproofVer ( C y , π y ) = 1 ;
    • A did not query O Corrupt ( ID ) for the UAV identity;
    • A did not obtain the same transcript via O Authenticate ( ID , · ) .
The authentication advantage is defined as
Adv A auth ( λ ) = Pr [ A wins Game 1 ] .
Theorem 1 
(Authentication Security). For a PPT adversary A issuing at most q reg , q auth , q corrupt queries and runtime t, there exist PPT algorithms B 1 and B 2 such that
Adv A auth ( λ )     q reg · Adv B 1 EUF - CMA + Adv B 2 ECDLP + q auth 2 2 λ + 1 + negl ( λ ) ,
where B 1 breaks Schnorr security and B 2 solves ECDLP.
Game 2: Geofence Soundness
The adversary attempts to generate a valid range proof for coordinates outside the authorized region R. Advantage is
Adv A geo ( λ ) = Pr [ A outputs valid proof outside R ] .
Theorem 2 
(Geofence Soundness). For at most q π proof attempts, there exist PPT reductions B 1 and B 2 such that
Adv A geo ( λ )     q π · ϵ BP ( λ ) + Adv B 2 ECDLP ( t ) + negl ( λ ) .
Game 3: Location Privacy
Location privacy is defined via an indistinguishability game. The adversary submits two coordinate pairs ( x 0 , y 0 ) , ( x 1 , y 1 ) R . The challenger randomly selects b { 0 , 1 } and returns commitments and proofs for ( x b , y b ) . A outputs a guess b . The advantage is
Adv A loc - priv ( λ ) = Pr [ b = b ] 1 2     Adv hide commit + q trans · ϵ ZK ( λ ) + negl ( λ ) ,
where Adv hide commit is the commitment-hiding advantage.

6.2.2. Concrete Security Analysis

For a 256-bit elliptic curve (e.g., Curve25519):
  • Adv ECDLP ( t ) t / 2 125 ;
  • Adv EUF - CMA ( t , q s , q h )     q h / 2 256 + Adv ECDLP ( t ) ;
  • ϵ BP ( λ )     2 128 ;
  • ϵ ZK ( λ ) is negligible.
For example, t = 2 80 , q reg = 2 20 , q auth = 2 30 gives
Adv A auth ( λ )     2 28 .
Increasing λ to 384 (e.g., NIST P-384) reduces the advantage to below 2 72 for t = 2 100 . Hence, PrivLocAuth achieves authentication unforgeability, geofence soundness, and location privacy with provably bounded adversarial advantage.

6.3. Resistance to Common Attacks

Table 3 shows the analyses of PrivLocAuth resilience against common attacks based on its cryptographic design and operational assumptions. Each attack is evaluated in terms of countermeasures, effectiveness, and residual limitations.
Replay Attacks: PrivLocAuth defends against both message-level and location-level replay attacks through a combination of freshness enforcement, stateful replay detection, and cryptographic binding. During registration and authentication, RA-issued credentials Cred d and protocol messages are protected using fresh 256-bit nonces ( n 1 , n 2 ) , timestamps ( T d , T c ) , and a CDS-side replay cache that records previously accepted session identifiers and freshness parameters [22]. This cache prevents nonce reuse within a bounded retention window and provides rollback protection through monotonic timestamp checks and persistent state. During authentication, the UAV generates session-specific Pedersen commitments ( C x , C y ) and corresponding Bulletproof range proofs for its current location. These commitments are cryptographically linked to the authenticated session key K d via a zero-knowledge range proof, ensuring that location evidence is tied to the current session without revealing precise coordinates. The LDS verifies the correctness of the submitted proofs and issues a short-lived signed attestation containing a timestamp T l . The CDS validates this attestation together with credential authenticity, revocation status, and session freshness. By enforcing freshness at both the message and location layers, the protocol prevents reuse of stale credentials, protocol messages, or location proofs, even in the presence of network delay or partial desynchronization. This design ensures resistance to replay and location spoofing attacks while preserving geofence compliance, location privacy, and cross-session unlinkability.
Impersonation and Forgery: The protocol ensures that only a legitimate UAV can successfully authenticate and submit location proofs. ECC-based Schnorr signatures and authenticated encryption guarantee that forging credentials or authentication messages is computationally infeasible under the hardness of the ECDLP. The UAV generates fresh Pedersen commitments and Bulletproof range proofs for its current location, which are submitted along with its authenticated identity K d to the LDS. The LDS verifies the correctness of the proofs and the cryptographic binding to K d without learning the exact coordinates, issuing a short-lived signed attestation. The CDS accepts location compliance only after verifying the LDS signature and C r e d d . This combination prevents impersonation and the submission of forged location commitments, while maintaining privacy and unlinkability across sessions.
Credential Theft: The UAV’s private key V d and RA-issued credential C r e d d are securely stored within the UAV and are never transmitted in plaintext. During authentication, C r e d d is verified by the CDS to confirm the UAV’s legitimacy, while all subsequent communications are protected using session-key encryption. Even in the event of partial device compromise, the protocol limits exposure by enforcing credential revocation through CDS-maintained revocation lists synchronized with the RA. Moreover, zero-knowledge Bulletproofs and LDS-attested fresh commitments ensure that revoked or unauthorized UAVs cannot produce valid, current location proofs, enabling real-time exclusion without revealing sensitive information.
Location Reconstruction and Trajectory Inference: The protocol prevents trajectory inference using fresh Pedersen commitments ( C x , C y ) and Bulletproof range proofs in each authentication session. Commitments are cryptographically bound to the authenticated UAV identity P d within an authenticated session context using zero-knowledge range proofs and attested by the LDS with a short-lived Schnorr signature. Each session uses fresh blinding factors and never reuses commitments, preventing adversaries from linking multiple sessions or intersecting ranges to infer movement. No exact coordinates are revealed, and RA involvement is unnecessary after the RA confirms the UAV’s legitimacy, ensuring location privacy, unlinkability, and verifiable geofence compliance across sessions.
Geofence Bypass: The protocol prevents geofence bypass through the soundness of Bulletproof range proofs, which ensures that only coordinates lying within the authorized region can be proven valid. Since the UAV generates fresh Pedersen commitments and corresponding Bulletproofs for each authentication session, forging an out-of-range location that satisfies the verification conditions is computationally infeasible, with soundness error bounded by approximately 2 128 . The LDS verifies these proofs and issues a signed attestation only if the committed location complies with the geofence, preventing malicious UAVs from bypassing spatial access control.
Man-in-the-Middle (MITM) and Tampering: PrivLocAuth resists man-in-the-middle and tampering attacks by establishing a session key derived from an ephemeral ECDH exchange authenticated via RA-issued credentials. The UAV and the CDS generate per-session ephemeral ECDH key pairs and authenticate the exchanged public keys using RA-issued credentials. The resulting shared secret is combined with fresh nonces ( n 1 , n 2 ) through HKDF to derive the session key S K d , c , binding the key to both authenticated identities and the current session. The CDS completes credential and key verification before accepting any location-related data. Location proofs are released by the LDS only as short-lived Schnorr-signed attestations and are encrypted under S K d , c . Any message modification, replay, or key-substitution attempt is detected during signature verification or authenticated decryption. Under standard ECDH, HKDF, and AEAD assumptions, the probability of a successful MITM or tampering attack is negligible.

6.4. Session Unlinkability

The PrivLocAuth protocol ensures that each authentication session remains unlinkable to any previous session, even when multiple sessions are observed. All protocol messages ( A u t h d , A u t h c , and A u t h d , c ) are encrypted and incorporate fresh nonces ( n 1 , n 2 ) and timestamps ( T d , T c ), ensuring that no plaintext information is exposed. Each session derives a new encryption key from these nonces, preventing external observers from linking sessions to the same UAV.
To further protect against correlation by an honest-but-curious CDS, session unlinkability is achieved through the use of fresh nonces, per-session key derivation, and session-specific location commitments. Although the RA-issued credential Cred d is long-term, it is never revealed in plaintext and is verified online by the RA without disclosing the UAV’s identity to the CDS. As a result, the CDS observes only encrypted protocol messages and session-specific public information, preventing linkage across authentication sessions. The CDS only observes the UAV’s ephemeral public key P d and encrypted messages; the long-term identity I D d is never revealed. This ensures that even if the UAV rotates or updates its keys across sessions, the CDS cannot correlate them.
Per-session location commitments ( C x , C y ) are generated by the UAV and attested by a trusted LDS before being sent to the CDS. Each LDS attestation is short-lived and includes a fresh timestamp T l , ensuring that even if a CDS observes multiple sessions, the commitments cannot be correlated across sessions. This combination of ephemeral keys, pseudonymous credentials, encrypted messages, and LDS-signed location proofs preserves both session unlinkability and location privacy, while supporting RA-based verification and timely revocation of compromised UAVs.

6.5. Location Privacy

In the PrivLocAuth protocol, the RA issues a long-term credential C r e d d that binds the UAV’s identity to its public key, while explicitly excluding any location-dependent information. This design choice ensures that spatial data is never embedded in static credentials, thereby preventing long-term linkability and location inference attacks.
During the authentication phase, after successful mutual authentication and session key establishment with the CDS, the UAV locally computes session-specific Pedersen commitments to its current coordinates C x = x · G + n x · H , C y = y · G + n y · H , where ( n x , n y ) Z p * are freshly generated blinding factors unique to the session. These commitments are submitted to the home LDS, which validates them and issues a short-lived Schnorr signature attesting to their correctness and freshness. The commitments and their attestation are then used to generate Bulletproof-based zero-knowledge range proofs. The RA never observes the UAV’s current coordinates, and the commitments are never reused.
To demonstrate compliance with an authorized geofence R = [ X min , X max ] × [ Y min , Y max ] , the UAV generates Bulletproof-based zero-knowledge range proofs, π x = Bulletproof G e n ( C x , [ X min , X max ] ) , π y = Bulletproof G e n ( C y , [ Y min , Y max ] ) , which are transmitted to the CDS under session-key encryption. These proofs enable the CDS to verify that the UAV operates within the permitted region without learning the actual coordinates ( x , y ) , the blinding randomness ( n x , n y ) , or the LDS-generated Schnorr signature contents.
Each Bulletproof range proof satisfies the zero-knowledge and soundness properties, ensuring that an authentication session reveals no information beyond the validity of the claimed geofence membership.
Under the hardness of the elliptic-curve discrete logarithm problem and the zero-knowledge and soundness properties of Bulletproof range proofs (with soundness error approximately 2 128 ), the adversary’s advantage in reconstructing the UAV’s precise location or flight trajectory remains negligible. Consequently, PrivLocAuth achieves strong location privacy, session unlinkability, and resistance to long-term spatial profiling, even under repeated geofence verifications across multiple domains.

7. Experimental Analysis

7.1. Computational Efficiency

The computational performance of the proposed PrivLocAuth protocol was evaluated using a Python-based benchmarking environment. The experimental evaluation was conducted on a consumer-grade laptop manufactured by HP Inc., Palo Alto, CA, USA, equipped with an AMD A8-7410 APU with Radeon R5 Graphics (Advanced Micro Devices, Sunnyvale, CA, USA) and 8 GB of RAM, running a Linux operating system and Python 3.13, employing explicitly defined cryptographic primitives and high-level data-processing libraries. The coincurve (https://github.com/ofek/coincurve (accessed on 23 November 2025)) library was used for elliptic-curve key generation and ECDH scalar multiplication operations. Schnorr signature generation and verification were implemented using the ecdsa (https://github.com/warner/python-ecdsa (accessed on 23 November 2025)) library, following the Schnorr-based authentication mechanism specified in the protocol design without reliance on hash-based constructions. Bulletproof range proof generation and verification were performed using pybulletproofs (https://github.com/initc3/pybulletproofs (accessed on 23 November 2025)), employing standard logarithmic-size range proofs. Session-key establishment and symmetric encryption were realized using primitives provided by the cryptography (https://github.com/pyca/cryptography (accessed on 23 November 2025)) library. Matplotlib 3.9.0 (https://matplotlib.org/ (accessed on 23 November 2025)) was used solely for visualization of experimental results.
Each cryptographic operation was executed 200 times, and its average execution time T ( O i ) = 1 200 j = 1 200 t j was recorded using Python’s high-resolution time.perf_counter(). The measured mean execution times are 0.227 ms for elliptic-curve scalar multiplication, 0.227 ms for elliptic-curve point addition, 0.553 ms for Pedersen commitment computation, 0.393 ms for Schnorr signing, 0.551 ms for Schnorr verification, 2.809 ms for ECDH-based asymmetric encapsulation and decapsulation, 0.709 ms for session-key encryption and decryption using AEAD primitives, 29.453 ms for Bulletproof range proof generation, and 4.243 ms for Bulletproof range proof verification. The session key S K d , c is derived via HKDF-SHA256 from ( n 1 , n 2 ) , whose computational cost is negligible compared to elliptic-curve and Bulletproof operations and is therefore omitted from the total cost.
The total computation time for each protocol phase was obtained by multiplying the mean execution time of each cryptographic operation by the number of times it appears in that phase and summing the results. In the Registration phase, two elliptic-curve scalar multiplications (performed by the UAV and the Registration Authority, respectively) and one Schnorr signing operation are executed, resulting in a total computation cost of 0.847 ms.
The Cross-Domain Authentication phase includes ECDH-based asymmetric encapsulation for the initial message exchanges, symmetric AEAD operations for session-protected messages, one elliptic-curve scalar multiplication, one Schnorr verification, two Pedersen commitment computations, and two Bulletproof range proof generations and verifications. The cumulative computation overhead of this phase is 72.794 ms across all participating entities.
Accordingly, the end-to-end computation time of the PrivLocAuth protocol, combining the Registration and Authentication phases, is 73.641 ms.
Figure 4 presents two visualizations: the first illustrates the average execution time of individual cryptographic operations, while the second depicts the aggregated computational overhead of each protocol phase. The results indicate that the Registration phase contributes minimally to the overall computational cost, whereas the Authentication phase is dominated by Bulletproof range proof generation and verification, providing a clear view of both per-operation costs and the cumulative protocol overhead.

7.2. Communication Overhead Analysis

The communication overhead of the proposed PrivLocAuth protocol is evaluated by accounting for all messages explicitly exchanged in Algorithms 1 and 2. The protocol is instantiated over the secp256r1 elliptic curve. A compressed elliptic-curve point occupies 33 bytes, a Schnorr signature occupies 64 bytes, nonces are 32 bytes, timestamps are 8 bytes, Pedersen commitments are 33 bytes, and each Bulletproof range proof occupies approximately 800 bytes for a 32-bit coordinate range.
As specified in Algorithm 2, asymmetric encryption is used only for the initial authentication messages exchanged between the UAV and the CDS. This encryption encapsulates an ephemeral elliptic-curve Diffie–Hellman exchange and introduces a fixed 64 byte overhead per ciphertext due to the transmitted ephemeral public key. After session key derivation using HKDF, subsequent messages are protected using symmetric authenticated-encryption (AEAD), whose ciphertext expansion is negligible and therefore not counted.
During registration (Algorithm 1), the UAV generates a key pair ( V d , P d ) and sends the registration message M d = ( I D d     P d ) to the RA. The identifier I D d is 32 bytes and the compressed public key P d is 33 bytes, yielding a message size of 65 bytes. The RA verifies the validity of P d and issues a registration credential C r e d d = SchnorrSign r ( P d ) , which consists solely of a 64-byte Schnorr signature binding the UAV’s public key to the RA. The total communication overhead of the registration phase is therefore 129 bytes.
To initiate authentication (Algorithm 2, Phase 1), the UAV selects a fresh nonce n 1 and timestamp T d and sends A u t h d = Enc P c ( P d     n 1     C r e d d     T d ) to the CDS. The plaintext includes the UAV public key (33 bytes), nonce (32 bytes), credential (64 bytes), and timestamp (8 bytes), totaling 137 bytes. Including the asymmetric encryption overhead, the transmitted message size is 201 bytes. Upon successful validation (Algorithm 2, Phase 2), the CDS generates a fresh nonce n 2 , timestamp T c , and a geofence R = [ X min , X max , Y min , Y max ] , and responds with A u t h c = Enc P d ( P c     R     n 1     n 2     T c ) . The plaintext contains the CDS public key (33 bytes), the geofence coordinates (16 bytes), two nonces (64 bytes), and a timestamp (8 bytes), for a total of 121 bytes. With asymmetric encryption overhead, this message occupies 185 bytes.
Following successful decryption (Algorithm 2, Phase 3), the UAV derives the session key S K d , c = HKDF ( K d , n 1 , n 2 ) , constructs Pedersen commitments C x and C y , and generates Bulletproof range proofs π x and π y . The LDS verifies the proofs and issues an attestation C r e d = SchnorrSign ( K d     C x     C y     π x     π y     R     T ) .
Finally, the UAV sends A u t h d , c = Enc S K d , c ( C r e d     T d ) to the CDS. The attestation payload consists of the UAV public key (33 bytes), two Pedersen commitments (66 bytes), two Bulletproof proofs (1600 bytes), the LDS Schnorr signature (64 bytes), the geofence description (16 bytes), the LDS timestamp (8 bytes), and the UAV timestamp (8 bytes), totaling 1795 bytes.
Communication between the UAV and the LDS is confined to a local administrative domain and is therefore excluded from the cross-domain communication overhead (Table 4).
Accordingly, the total communication overhead of the cross-domain authentication phase is 201 + 185 + 1795 = 2181 bytes . Including the registration phase, the overall communication cost of the PrivLocAuth protocol is 2310 bytes (approximately 2.31 KB).

8. Conclusions

This paper presented PrivLocAuth, a privacy-preserving cross-domain UAV authentication protocol that enables cryptographically enforced geofence compliance without disclosing exact location information or long-term UAV identities. By combining Pedersen commitments, Bulletproof range proofs, and Schnorr-based credentials, the protocol achieves fine-grained spatial authorization together with strong privacy and unlinkability guarantees. PrivLocAuth adopts a role-separated architecture in which the RA is restricted to one-time enrollment and on-demand revocation, the LDS validates location correctness and freshness, and the CDS enforces access control using zero-knowledge evidence. This design eliminates continuous authority involvement and prevents centralized tracking or session correlation.
Formal security analysis demonstrates that PrivLocAuth provides resistance to impersonation, replay, and forgery attacks under the hardness of the Elliptic Curve Discrete Logarithm Problem, while geofence compliance is guaranteed by Bulletproof soundness bounded by approximately 2 128 . Session unlinkability and protection against trajectory inference are ensured through per-session Pedersen commitments, fresh nonces, and short-lived LDS attestations. Experimental evaluation confirms that PrivLocAuth is practical for real-time UAV deployment. The total computation overhead is 73.641 ms , dominated by Bulletproof generation and verification, while the overall communication overhead remains modest at 2310 bytes per UAV, despite the inclusion of zero-knowledge proofs. This demonstrates that the protocol is suitable for bandwidth- and energy-constrained UAV platforms, with minimal impact on mission performance.
Overall, PrivLocAuth demonstrates that strong location privacy, formal security guarantees, and efficient cross-domain authentication can be achieved simultaneously. It provides a robust foundation for secure and privacy-preserving UAV operations in dynamic multi-domain environments, supporting fine-grained spatial authorization without compromising operational efficiency or user privacy.

Author Contributions

Conceptualization, S.N.; Methodology, S.N. and J.X.; Software, S.N.; Validation, S.N. and G.Y.; Formal analysis, S.N. and J.X.; Investigation, S.N., J.X. and G.Y.; Resources, S.N.; Data curation, S.N.; Writing—original draft, S.N.; Writing—review & editing, S.N.; Visualization, S.N. and C.J.L.; Supervision, X.W. and C.J.L.; Project administration, X.W.; Funding acquisition, X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Yang, W.; Wang, S.; Yin, X.; Wang, X.; Hu, J. A Review on Security Issues and Solutions of the Internet of UAVs. IEEE Open J. Comput. Soc. 2022, 3, 96–110. [Google Scholar] [CrossRef]
  2. Naziri, S.; Wang, X.; Yu, G.; Liang, C.; Ni, W. ZAPS: A zero-knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy. Adv. Knowl.-Based Syst. Data Sci. Cybersecur. 2025, 2, 236–259. [Google Scholar] [CrossRef]
  3. Ma, B.; Zhao, Y.; Wang, X.; Jiang, Y.; Li, J.; Ni, W.; Liu, R.P. Differential Privacy-Based Location Privacy Protection with Hilbert Curve in Vehicular Networks. In Network Simulation and Evaluation; Communications in Computer and Information Science; Springer: Singapore, 2024; Volume 2064, pp. 252–268. [Google Scholar] [CrossRef]
  4. Karmakar, R.; Kaddoum, G.; Akhrif, O. A Blockchain-Based Distributed and Intelligent Clustering-Enabled Authentication Protocol for UAV Swarms. IEEE Trans. Mob. Comput. 2024, 23, 6178–6195. [Google Scholar] [CrossRef]
  5. Ma, B.; Wang, X.; Ni, W.; Liu, R.P. Privacy in Vehicular Networks: Challenges and Solutions, 1st ed.; CRC Press: Boca Raton, FL, USA, 2025. [Google Scholar] [CrossRef]
  6. Wang, H.; Fan, K.; Yu, C.; Zhang, K.; Li, F.; Li, H.; Yang, Y.; Zhu, H. LSPSS: Constructing a Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing. IEEE Trans. Serv. Comput. 2024, 17, 2583–2596. [Google Scholar] [CrossRef]
  7. Wang, M.; Zhao, D.; Yan, Z.; Wang, H.; Li, T. XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets. IEEE Internet Things J. 2023, 10, 5962–5976. [Google Scholar] [CrossRef]
  8. Koulianos, A.; Paraskevopoulos, P.; Litke, A.; Papadakis, N.K. Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof. Sensors 2024, 24, 5838. [Google Scholar] [CrossRef]
  9. Pan, H.; Wang, Y.; Wang, W.; Cao, P.; Wu, Q. Privacy-preserving location authentication for low-altitude UAVs: A blockchain-based approach. Secur. Saf. 2024, 3, 2024004. [Google Scholar] [CrossRef]
  10. Ma, B.; Wang, X.; Lin, X.; Jiang, Y.; Sun, C.; Wang, Z.; Yu, G.; He, Y.; Ni, W.; Liu, R.P. Location privacy threats and protections in future vehicular networks: A comprehensive review. arXiv 2023, arXiv:2305.04503. [Google Scholar] [CrossRef]
  11. Zhu, Y.; Zhou, Y.; Wang, J.; Yang, B.; Zhang, M. A Lightweight Cross-Domain Direct Identity Authentication Protocol for VANETs. IEEE Internet Things J. 2024, 11, 37741–37757. [Google Scholar] [CrossRef]
  12. Chen, J.; Zhan, Z.; He, K.; Du, R.; Wang, D.; Liu, F. XAuth: Efficient Privacy-Preserving Cross-Domain Authentication. IEEE Trans. Dependable Secur. Comput. 2022, 19, 3301–3311. [Google Scholar] [CrossRef]
  13. Chen, X.; Gao, Y.; Deng, H. AIFL: Ensuring Unlinkable Anonymity and Robust Incentive in Cross-Device Federated Learning. IEEE Internet Things J. 2024, 11, 36688–36702. [Google Scholar] [CrossRef]
  14. Keshavarz, M.; Gharib, M.; Afghah, F.; Ashdown, J.D. UASTrustChain: A Decentralized Blockchain- Based Trust Monitoring Framework for Autonomous Unmanned Aerial Systems. IEEE Access 2020, 8, 226074–226088. [Google Scholar] [CrossRef]
  15. Zhang, L.; Huang, Y.; Nie, J.; Wang, K. Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management. Comput. Mater. Contin. 2023, 77, 1467–1488. [Google Scholar] [CrossRef]
  16. Zhang, Z.; Li, H.; Li, D.; Li, K.-C. AAMB: A cross-domain identity authentication scheme based on multilayered blockchains in IoMT. J. Supercomput. 2025, 81, 843. [Google Scholar] [CrossRef]
  17. Zhang, Z.; Ren, W.; Zhang, X.; Sun, Y.; Zhu, T.; Choo, K.K.R. A blockchain and signature based scheme for cross-domain authentication with decentralized identity. Comput. Stand. Interfaces 2025, 94, 103994. [Google Scholar] [CrossRef]
  18. Tan, Y.; Wang, J.; Liu, J.; Kato, N. Blockchain-Assisted Distributed and Lightweight Authentication Service for Industrial Unmanned Aerial Vehicles. IEEE Internet Things J. 2022, 9, 16928–16940. [Google Scholar] [CrossRef]
  19. Chen, B.; Wang, Z.; Xiang, T.; Yang, J.; He, D.; Choo, K.K.R. BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs. Veh. Commun. 2023, 41, 100602. [Google Scholar] [CrossRef]
  20. Bünz, B.; Bootle, J.; Boneh, D.; Poelstra, A.; Wuille, P.; Maxwell, G. Bulletproofs: Short Proofs for Confidential Transactions and More. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–24 May 2018; pp. 315–334. [Google Scholar] [CrossRef]
  21. Seifelnasr, M.; AlTawy, R.; Youssef, A. A Conditional Privacy-Preserving Protocol for Cross-Domain Communications in VANET. IEEE Trans. Intell. Transp. Syst. 2025, 6, 5251–5263. [Google Scholar] [CrossRef]
  22. Boneh, D.; Boyen, X.; Shacham, H. Short Group Signatures. In Advances in Cryptology—CRYPTO 2004; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2004; Volume 3152, pp. 41–55. [Google Scholar]
  23. Doerner, J.; Kondi, Y.; Lee, E.; Shelat, A.; Tyner, L. Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. In Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 21–25 May 2023; pp. 773–789. [Google Scholar] [CrossRef]
  24. Chodorek, A.; Chodorek, R.R. Web Real-Time Communications-Based Unmanned-Aerial-Vehicle-Borne Internet of Things and Stringent Time Sensitivity. Sensors 2025, 25, 524. [Google Scholar] [CrossRef]
  25. Goldreich, O. Foundations of Cryptography: Volume 1, Basic Tools; Cambridge University Press: Cambridge, UK, 2001. [Google Scholar]
  26. Koblitz, N.; Menezes, A.; Vanstone, S. The state of elliptic curve cryptography. Des. Codes Cryptogr. 2000, 19, 173–193. [Google Scholar] [CrossRef]
  27. Joux, A.; Nguyen, K. Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. J. Cryptol. 2003, 16, 239–247. [Google Scholar] [CrossRef]
  28. Pedersen, T. Non-interactive and information-theoretic secure verifiable secret sharing. In Proceedings of the 8th Annual International Cryptology Conference, Santa Barbara, CA, USA, 21–25 August 1991; pp. 129–140. [Google Scholar]
  29. Fiege, U.; Fiat, A.; Shamir, A. zero-knowledge proofs of identity. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing, New York, NY, USA, 25–27 May 1987; pp. 210–217. [Google Scholar]
  30. Naziri, S.; Wang, X.; Yu, G.; Xu, J.; Shrestha, S.; Liang, C.J. SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems. In Proceedings of the 2024 17th International Conference on Security of Information and Networks (SIN), Sydney, Australia, 2–4 December 2024; pp. 1–8. [Google Scholar] [CrossRef]
  31. Fleischhacker, N.; Jager, T.; Schröder, D. On tight security proofs for Schnorr signatures. J. Cryptol. 2019, 32, 566–599. [Google Scholar] [CrossRef]
  32. Raihi, D.M.; Machani, S.; Pei, M.; Rydell, J. TOTP: Time-Based One-Time Password Algorithm. RFC 6238, Internet Engineering Task Force (IETF). May 2011. Available online: https://www.rfc-editor.org/rfc/rfc6238 (accessed on 25 February 2026).
Figure 2. UAV registration with RA phase of PrivLocAuth protocol.
Figure 2. UAV registration with RA phase of PrivLocAuth protocol.
Electronics 15 01243 g002
Figure 3. Cross-domain authentication location privacy phase for the PrivLocAuth protocol.
Figure 3. Cross-domain authentication location privacy phase for the PrivLocAuth protocol.
Electronics 15 01243 g003
Figure 4. Computation time and overhead analysis of the PrivLocAuth protocol.
Figure 4. Computation time and overhead analysis of the PrivLocAuth protocol.
Electronics 15 01243 g004
Table 1. Comparison of authentication approaches across selected references.
Table 1. Comparison of authentication approaches across selected references.
Metric[2][8][12][13,14][15,16][9,23]PrivLocAuth
Auth. Time (ms)15.222,3091325250–1962122–324168.9272.749
Location PrivacyPartial
UnlinkabilityPartialPartial
Non-Setup
LightweightModerateModerateModerateModerate
Note: ✓ indicates that the feature is supported, while ✗ indicates that the feature is not supported.
Table 2. Notation used in this PrivLocAuth protocol.
Table 2. Notation used in this PrivLocAuth protocol.
NotationDescription
C D S c Cross-Domain Server
L D S l Local Domain Server
D d UAV (Drone)
R A r Registration Authority
G, HIndependent generator points
P i , V i Public and Private key
K i Shared key
S k i , j Session key between entities i and j
π x , π y Bulletproofs for x and y range proof
C x , C y Pedersen commitments to x and y
RGeofence range [ X m i n , X m a x , Y m i n , Y m a x ]
n x , n y Random scalars used in Pedersen commitments
C r e d i Anonymous credential
Z p * Multiplicative group of order p 1
F p Finite field
E p ( a , b ) Elliptic curve over F p
Δ T f , Δ T r p Maximum transmission delay, Reply blocking window
T i Current timestamp
Auth Verification information
n i Nonces used for freshness
x, yUAV’s real location coordinates
A ˜ The adversary
M i Message
E n c / D e c Encryption and Decryption
Table 3. Resistance against common attacks in PrivLocAuth.
Table 3. Resistance against common attacks in PrivLocAuth.
Attack TypeCountermeasureSecurity Bound/Notes
Replay AttacksSession-specific nonces ( n 1 , n 2 ) , timestamps ( T d , T c ) , server-side replay cache Δ T r p Replay attempts rejected via freshness and state validation
Impersonation/ForgeryECC-based Schnorr signatures, authenticated encryption, ZK binding of commitments to P d Computationally infeasible under ECDLP; Pr [ Forge ] negl ( λ )
Credential TheftSecure storage of V d and C r e d d , short credential lifetimes, RA-synchronized revocationCompromise valid only until revocation; LDS attestation prevents use of revoked credentials
Location Reconstruction/ Trajectory InferenceFresh Pedersen commitments ( C x , C y ) per session, Bulletproofs, LDS-attested Schnorr signatures, fresh blinding factors ( n x , n y ) Leakage negligible; unlinkable per session; trajectory inference prevented
Geofence BypassBulletproof range proof soundness (128-bit), LDS/CDS verification Pr [ Bypass ]     2 128 ; infeasible to prove out-of-range location
MITM/TamperingECDH-derived session key S K d , c , authenticated encryption, integrity and signature verificationModification or substitution detected; Pr [ Tamper Success ] negl ( λ )
Table 4. Communication overhead of the PrivLocAuth protocol.
Table 4. Communication overhead of the PrivLocAuth protocol.
PhaseMessage ContentsSize (Bytes)
1. Registration (plaintext)
M d (UAV → RA) I D d , P d 65
C r e d d (RA → UAV) SchnorrSign r ( P d ) 64
Registration total: 129 B
2. Cross-Domain Authentication
A u t h d (UAV → CDS) P d , n 1 , C r e d d , T d + asym. OH201
A u t h c (CDS → UAV) P c , R , n 1 , n 2 , T c + asym. OH185
A u t h d , c (UAV → CDS) C r e d ( K d , C x , C y , π x , π y , R , T ) , T d 1795
Authentication total: 2181 B
Overall total: 2310 B (≈2.31 KB)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Naziri, S.; Wang, X.; Xu, J.; Liang, C.J.; Yu, G. PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy. Electronics 2026, 15, 1243. https://doi.org/10.3390/electronics15061243

AMA Style

Naziri S, Wang X, Xu J, Liang CJ, Yu G. PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy. Electronics. 2026; 15(6):1243. https://doi.org/10.3390/electronics15061243

Chicago/Turabian Style

Naziri, Shayesta, Xu Wang, Jian Xu, Christy Jie Liang, and Guangsheng Yu. 2026. "PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy" Electronics 15, no. 6: 1243. https://doi.org/10.3390/electronics15061243

APA Style

Naziri, S., Wang, X., Xu, J., Liang, C. J., & Yu, G. (2026). PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy. Electronics, 15(6), 1243. https://doi.org/10.3390/electronics15061243

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop