PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy
Abstract
1. Introduction
- We propose PrivLocAuth, a geofence-aware and privacy-preserving cross-domain authentication framework for UAVs. PrivLocAuth enables a UAV to prove its compliant presence within an authorized geographic region without revealing exact GPS coordinates. By integrating geofence-based authorization with zero-knowledge range proofs, the framework enforces fine-grained spatial access control while preventing trajectory inference, mission leakage, and location-based tracking across-domains.
- We propose a cross-domain UAV authentication framework in which the RA is involved only during enrollment and on-demand revocation checks. UAV legitimacy is established using RA-issued anonymous credentials, while geofence compliance is endorsed by the LDS through short-lived attestations on session-specific location commitments. The CDS enforces access decisions based on these verifiable LDS endorsements and zero-knowledge proofs, without learning UAV identities or precise locations, thereby enabling scalable and lightweight authentication across multiple administrative domains.
- The protocol integrates efficient elliptic-curve cryptography, Schnorr signatures, and zero-knowledge proofs. The resulting design achieves a favorable balance between security, privacy, and computational overhead, making it practical for deployment in resource-constrained UAVs and Internet-of-Drones environments. Formal security analysis confirms resistance to impersonation, replay, and forgery attacks, while experimental evaluation shows real-time feasibility, with the Registration Phase completing in approximately ms and the Authentication Phase in ms.
2. Related Work
3. Preliminaries
3.1. Elliptic Curve Cryptography (ECC)
Elliptic Curve Discrete Logarithm Problem (ECDLP)
3.2. Pedersen Commitments
3.3. Zero-Knowledge Proofs Systems
Bulletproofs (Range Proofs)
3.4. Schnorr Signatures
4. System Model of Proposed Protocol
4.1. Main Entities
- Registration Authority (RA): A trusted, centralized authority responsible for registering UAVs and issuing credentials () using its secret key . It defines the cryptographic system parameters, issues Schnorr-signed UAV credentials, and enables secure cross-domain authentication while preserving UAV anonymity.
- Local Domain Server (LDS): A domain-local authority that manages UAVs within its domain, verifies Pedersen commitments and zero-knowledge Bulletproof range proofs, and issues short-lived Schnorr-signed attestations confirming that UAV locations are valid and fresh without revealing exact coordinates.
- Cross-Domain Server (CDS): A domain visited by the UAV. It authenticates visiting UAVs using their RA-issued credentials and LDS-attested location proofs, without learning the UAV’s real identity or exact location. The CDS relies on RA online verification for credential legitimacy and revocation enforcement, and on LDS-issued attestations for geofence compliance.
- UAV (Drone): A mobile autonomous entity seeking authenticated access to resources or airspace in foreign domains. It holds a private ECC key and credential (), and generates Pedersen commitments and Bulletproof range proofs to prove geofence compliance while preserving location and identity privacy.

4.2. Operational Context
4.3. Assumptions
4.4. Security Requirements
- Robust UAV Authentication: Only UAVs possessing a valid RA-issued credential and the corresponding private key can successfully authenticate to a CDS. Each authentication session is bound to fresh nonces and a session key established via an implicit ECDH-based authenticated key agreement and derived using HKDF. The nonces ensure freshness and replay protection but do not serve as keying material.
- Location Privacy Preservation: Raw GPS coordinates are never transmitted. The UAV encodes its current location into fresh Pedersen commitments per session and generates zero-knowledge Bulletproof range proofs to demonstrate geofence compliance. These commitments and proofs are attested by the LDS via a short-lived Schnorr signature, ensuring that location data remains hidden even if adversaries access stored commitments, credentials, or protocol transcripts.
- Geofence Soundness Enforcement: Each UAV proves in zero-knowledge that its committed location lies within the authorized geofence . The soundness of Bulletproofs ensures that out-of-range coordinates cannot be falsely verified. The LDS verifies the Bulletproof range proofs and commitment freshness and issues a signed attestation, while the CDS verifies the validity of the LDS-issued Schnorr attestation before granting access.
- Replay Attack Resistance: Each authentication session is protected using session-specific nonces , timestamps , and a server-side replay cache. The CDS rejects duplicated nonces and stale timestamps within the defined freshness window , ensuring that replayed or delayed messages cannot be accepted. Even in the presence of temporary clock drift, GPS loss, or local resets, session replay remains infeasible.
- Unforgeability Under ECDLP: All credentials, signatures, and cryptographic commitments rely on the computational hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Forging RA-issued credentials or LDS attestations, or generating accepting Bulletproof proofs for out-of-range values without the corresponding witnesses, is infeasible under standard elliptic-curve hardness and zero-knowledge proof soundness assumptions.
- Session Unlinkability: Each UAV generates fresh Pedersen commitments and Bulletproof proofs for every authentication session, and the LDS issues short-lived attestations bound only to the current session. Public keys may be updated over time under RA control, while the RA internally maps them to the persistent identity . As a result, multiple protocol sessions cannot be linked to infer UAV movement patterns or operational behavior.
- Side-Channel Mitigations: The protocol employs randomized nonces and ephemeral elliptic-curve computations to introduce variability in cryptographic operations. While no formal side-channel model or constant-time implementation is assumed, timing analysis was performed using Python-based cryptographic libraries to evaluate computational overhead. This analysis provides an initial assessment of protocol performance and timing characteristics but does not claim full resistance against timing or power-analysis attacks on UAV hardware.
- Revocation Compliance: The CDS validates UAV credentials and checks the revocation status of the presented credential via the online RA, with optional temporary caching of recent revocation outcomes to improve efficiency. Location proofs are accepted only if attested by the LDS and valid for the current session. Any revoked or compromised UAV attempting to authenticate is rejected, and the corresponding credential or public-key reference may be temporarily recorded within replay or revocation caches without storing persistent identity or location information, thereby preserving unlinkability, location privacy, and geofence enforcement.
5. Proposed Protocol
5.1. Setup Phase
5.2. UAV Registration with RA
| Algorithm 1: UAV Registration Phase. |
|
5.3. Cross-Domain Authentication and Revocation
| Algorithm 2: Cross-Domain UAV Authentication and Geofence Verification |
|
6. Security Analysis
6.1. Adversary Model
6.2. Formal Game-Based Security Proof
Oracle Definitions
- : Registers UAV and returns its public key and associated credential.
- : Returns the long-term private key and credential .
- : Delivers message to a protocol participant and returns the resulting response.
- : Reveals the session key for session identifier .
- : Executes the authentication protocol between UAV and cross-domain server and returns the transcript.
Trust Model
Hardness Assumptions
- 1.
- ECDLP. The Elliptic Curve Discrete Logarithm Problem is hard; any PPT adversary running in time t has advantage .
- 2.
- Schnorr EUF-CMA. Schnorr signatures are existentially unforgeable under chosen-message attacks; advantage denoted .
- 3.
- Bulletproof Soundness. The range proof system is computationally sound with error .
- 4.
- Bulletproof Zero-Knowledge. The proofs reveal no additional information; simulation error .
- 5.
- DDH. The Decisional Diffie–Hellman problem is hard with advantage .
- 6.
- ECIES IND-CCA. ECIES encryption resists adaptive chosen-ciphertext attacks with advantage .
- 7.
- Pedersen Commitment Hiding. Commitments are computationally hiding under the discrete logarithm assumption.
6.2.1. Security Games and Theorems
Game 1: Authentication Unforgeability
- Setup: The challenger runs to generate system parameters and simulates all oracles.
- Adversarial Goal: outputs a transcriptrepresenting a forged location-authentication message. wins if:
- ;
- and ;
- did not query for the UAV identity;
- did not obtain the same transcript via .
Game 2: Geofence Soundness
Game 3: Location Privacy
6.2.2. Concrete Security Analysis
- ;
- ;
- ;
- is negligible.
6.3. Resistance to Common Attacks
6.4. Session Unlinkability
6.5. Location Privacy
7. Experimental Analysis
7.1. Computational Efficiency
7.2. Communication Overhead Analysis
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Yang, W.; Wang, S.; Yin, X.; Wang, X.; Hu, J. A Review on Security Issues and Solutions of the Internet of UAVs. IEEE Open J. Comput. Soc. 2022, 3, 96–110. [Google Scholar] [CrossRef]
- Naziri, S.; Wang, X.; Yu, G.; Liang, C.; Ni, W. ZAPS: A zero-knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy. Adv. Knowl.-Based Syst. Data Sci. Cybersecur. 2025, 2, 236–259. [Google Scholar] [CrossRef]
- Ma, B.; Zhao, Y.; Wang, X.; Jiang, Y.; Li, J.; Ni, W.; Liu, R.P. Differential Privacy-Based Location Privacy Protection with Hilbert Curve in Vehicular Networks. In Network Simulation and Evaluation; Communications in Computer and Information Science; Springer: Singapore, 2024; Volume 2064, pp. 252–268. [Google Scholar] [CrossRef]
- Karmakar, R.; Kaddoum, G.; Akhrif, O. A Blockchain-Based Distributed and Intelligent Clustering-Enabled Authentication Protocol for UAV Swarms. IEEE Trans. Mob. Comput. 2024, 23, 6178–6195. [Google Scholar] [CrossRef]
- Ma, B.; Wang, X.; Ni, W.; Liu, R.P. Privacy in Vehicular Networks: Challenges and Solutions, 1st ed.; CRC Press: Boca Raton, FL, USA, 2025. [Google Scholar] [CrossRef]
- Wang, H.; Fan, K.; Yu, C.; Zhang, K.; Li, F.; Li, H.; Yang, Y.; Zhu, H. LSPSS: Constructing a Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing. IEEE Trans. Serv. Comput. 2024, 17, 2583–2596. [Google Scholar] [CrossRef]
- Wang, M.; Zhao, D.; Yan, Z.; Wang, H.; Li, T. XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets. IEEE Internet Things J. 2023, 10, 5962–5976. [Google Scholar] [CrossRef]
- Koulianos, A.; Paraskevopoulos, P.; Litke, A.; Papadakis, N.K. Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof. Sensors 2024, 24, 5838. [Google Scholar] [CrossRef]
- Pan, H.; Wang, Y.; Wang, W.; Cao, P.; Wu, Q. Privacy-preserving location authentication for low-altitude UAVs: A blockchain-based approach. Secur. Saf. 2024, 3, 2024004. [Google Scholar] [CrossRef]
- Ma, B.; Wang, X.; Lin, X.; Jiang, Y.; Sun, C.; Wang, Z.; Yu, G.; He, Y.; Ni, W.; Liu, R.P. Location privacy threats and protections in future vehicular networks: A comprehensive review. arXiv 2023, arXiv:2305.04503. [Google Scholar] [CrossRef]
- Zhu, Y.; Zhou, Y.; Wang, J.; Yang, B.; Zhang, M. A Lightweight Cross-Domain Direct Identity Authentication Protocol for VANETs. IEEE Internet Things J. 2024, 11, 37741–37757. [Google Scholar] [CrossRef]
- Chen, J.; Zhan, Z.; He, K.; Du, R.; Wang, D.; Liu, F. XAuth: Efficient Privacy-Preserving Cross-Domain Authentication. IEEE Trans. Dependable Secur. Comput. 2022, 19, 3301–3311. [Google Scholar] [CrossRef]
- Chen, X.; Gao, Y.; Deng, H. AIFL: Ensuring Unlinkable Anonymity and Robust Incentive in Cross-Device Federated Learning. IEEE Internet Things J. 2024, 11, 36688–36702. [Google Scholar] [CrossRef]
- Keshavarz, M.; Gharib, M.; Afghah, F.; Ashdown, J.D. UASTrustChain: A Decentralized Blockchain- Based Trust Monitoring Framework for Autonomous Unmanned Aerial Systems. IEEE Access 2020, 8, 226074–226088. [Google Scholar] [CrossRef]
- Zhang, L.; Huang, Y.; Nie, J.; Wang, K. Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management. Comput. Mater. Contin. 2023, 77, 1467–1488. [Google Scholar] [CrossRef]
- Zhang, Z.; Li, H.; Li, D.; Li, K.-C. AAMB: A cross-domain identity authentication scheme based on multilayered blockchains in IoMT. J. Supercomput. 2025, 81, 843. [Google Scholar] [CrossRef]
- Zhang, Z.; Ren, W.; Zhang, X.; Sun, Y.; Zhu, T.; Choo, K.K.R. A blockchain and signature based scheme for cross-domain authentication with decentralized identity. Comput. Stand. Interfaces 2025, 94, 103994. [Google Scholar] [CrossRef]
- Tan, Y.; Wang, J.; Liu, J.; Kato, N. Blockchain-Assisted Distributed and Lightweight Authentication Service for Industrial Unmanned Aerial Vehicles. IEEE Internet Things J. 2022, 9, 16928–16940. [Google Scholar] [CrossRef]
- Chen, B.; Wang, Z.; Xiang, T.; Yang, J.; He, D.; Choo, K.K.R. BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs. Veh. Commun. 2023, 41, 100602. [Google Scholar] [CrossRef]
- Bünz, B.; Bootle, J.; Boneh, D.; Poelstra, A.; Wuille, P.; Maxwell, G. Bulletproofs: Short Proofs for Confidential Transactions and More. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–24 May 2018; pp. 315–334. [Google Scholar] [CrossRef]
- Seifelnasr, M.; AlTawy, R.; Youssef, A. A Conditional Privacy-Preserving Protocol for Cross-Domain Communications in VANET. IEEE Trans. Intell. Transp. Syst. 2025, 6, 5251–5263. [Google Scholar] [CrossRef]
- Boneh, D.; Boyen, X.; Shacham, H. Short Group Signatures. In Advances in Cryptology—CRYPTO 2004; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2004; Volume 3152, pp. 41–55. [Google Scholar]
- Doerner, J.; Kondi, Y.; Lee, E.; Shelat, A.; Tyner, L. Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. In Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 21–25 May 2023; pp. 773–789. [Google Scholar] [CrossRef]
- Chodorek, A.; Chodorek, R.R. Web Real-Time Communications-Based Unmanned-Aerial-Vehicle-Borne Internet of Things and Stringent Time Sensitivity. Sensors 2025, 25, 524. [Google Scholar] [CrossRef]
- Goldreich, O. Foundations of Cryptography: Volume 1, Basic Tools; Cambridge University Press: Cambridge, UK, 2001. [Google Scholar]
- Koblitz, N.; Menezes, A.; Vanstone, S. The state of elliptic curve cryptography. Des. Codes Cryptogr. 2000, 19, 173–193. [Google Scholar] [CrossRef]
- Joux, A.; Nguyen, K. Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. J. Cryptol. 2003, 16, 239–247. [Google Scholar] [CrossRef]
- Pedersen, T. Non-interactive and information-theoretic secure verifiable secret sharing. In Proceedings of the 8th Annual International Cryptology Conference, Santa Barbara, CA, USA, 21–25 August 1991; pp. 129–140. [Google Scholar]
- Fiege, U.; Fiat, A.; Shamir, A. zero-knowledge proofs of identity. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing, New York, NY, USA, 25–27 May 1987; pp. 210–217. [Google Scholar]
- Naziri, S.; Wang, X.; Yu, G.; Xu, J.; Shrestha, S.; Liang, C.J. SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems. In Proceedings of the 2024 17th International Conference on Security of Information and Networks (SIN), Sydney, Australia, 2–4 December 2024; pp. 1–8. [Google Scholar] [CrossRef]
- Fleischhacker, N.; Jager, T.; Schröder, D. On tight security proofs for Schnorr signatures. J. Cryptol. 2019, 32, 566–599. [Google Scholar] [CrossRef]
- Raihi, D.M.; Machani, S.; Pei, M.; Rydell, J. TOTP: Time-Based One-Time Password Algorithm. RFC 6238, Internet Engineering Task Force (IETF). May 2011. Available online: https://www.rfc-editor.org/rfc/rfc6238 (accessed on 25 February 2026).



| Metric | [2] | [8] | [12] | [13,14] | [15,16] | [9,23] | PrivLocAuth |
|---|---|---|---|---|---|---|---|
| Auth. Time (ms) | 15.2 | 22,309 | 1325 | 250–1962 | 122–3241 | 68.92 | 72.749 |
| Location Privacy | ✓ | ✓ | ✗ | ✗ | Partial | ✓ | ✓ |
| Unlinkability | ✓ | ✓ | ✗ | Partial | Partial | ✓ | ✓ |
| Non-Setup | ✗ | ✗ | ✓ | ✓ | ✗ | ✓ | ✓ |
| Lightweight | Moderate | ✗ | Moderate | Moderate | ✗ | Moderate | ✓ |
| Notation | Description |
|---|---|
| Cross-Domain Server | |
| Local Domain Server | |
| UAV (Drone) | |
| Registration Authority | |
| G, H | Independent generator points |
| Public and Private key | |
| Shared key | |
| Session key between entities i and j | |
| Bulletproofs for x and y range proof | |
| Pedersen commitments to x and y | |
| R | Geofence range |
| Random scalars used in Pedersen commitments | |
| Anonymous credential | |
| Multiplicative group of order | |
| Finite field | |
| Elliptic curve over | |
| , | Maximum transmission delay, Reply blocking window |
| Current timestamp | |
| Verification information | |
| Nonces used for freshness | |
| x, y | UAV’s real location coordinates |
| The adversary | |
| Message | |
| Encryption and Decryption |
| Attack Type | Countermeasure | Security Bound/Notes |
|---|---|---|
| Replay Attacks | Session-specific nonces , timestamps , server-side replay cache | Replay attempts rejected via freshness and state validation |
| Impersonation/Forgery | ECC-based Schnorr signatures, authenticated encryption, ZK binding of commitments to | Computationally infeasible under ECDLP; |
| Credential Theft | Secure storage of and , short credential lifetimes, RA-synchronized revocation | Compromise valid only until revocation; LDS attestation prevents use of revoked credentials |
| Location Reconstruction/ Trajectory Inference | Fresh Pedersen commitments per session, Bulletproofs, LDS-attested Schnorr signatures, fresh blinding factors | Leakage negligible; unlinkable per session; trajectory inference prevented |
| Geofence Bypass | Bulletproof range proof soundness (128-bit), LDS/CDS verification | ; infeasible to prove out-of-range location |
| MITM/Tampering | ECDH-derived session key , authenticated encryption, integrity and signature verification | Modification or substitution detected; |
| Phase | Message Contents | Size (Bytes) |
|---|---|---|
| 1. Registration (plaintext) | ||
| (UAV → RA) | 65 | |
| (RA → UAV) | 64 | |
| Registration total: 129 B | ||
| 2. Cross-Domain Authentication | ||
| (UAV → CDS) | + asym. OH | 201 |
| (CDS → UAV) | + asym. OH | 185 |
| (UAV → CDS) | 1795 | |
| Authentication total: 2181 B | ||
| Overall total: 2310 B (≈2.31 KB) | ||
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Naziri, S.; Wang, X.; Xu, J.; Liang, C.J.; Yu, G. PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy. Electronics 2026, 15, 1243. https://doi.org/10.3390/electronics15061243
Naziri S, Wang X, Xu J, Liang CJ, Yu G. PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy. Electronics. 2026; 15(6):1243. https://doi.org/10.3390/electronics15061243
Chicago/Turabian StyleNaziri, Shayesta, Xu Wang, Jian Xu, Christy Jie Liang, and Guangsheng Yu. 2026. "PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy" Electronics 15, no. 6: 1243. https://doi.org/10.3390/electronics15061243
APA StyleNaziri, S., Wang, X., Xu, J., Liang, C. J., & Yu, G. (2026). PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy. Electronics, 15(6), 1243. https://doi.org/10.3390/electronics15061243

