Next Article in Journal
Slope Terrain Gait Planning and Admittance Control Method for Underwater Quadruped Robots Based on Righting Moment Compensation
Previous Article in Journal
Estimating Traits of Tillandsia landbeckii Using a Newly Developed VNIR/SWIR Multispectral UAV Imaging System in the Atacama Desert
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Drone-Assisted Lightweight Authentication Protocol for Unmanned eVTOL Emergency Rescue

1
School of Mathematics, Hangzhou Normal University, Hangzhou 311121, China
2
School of Information Science and Technology, Hangzhou Normal University, Hangzhou 311121, China
*
Author to whom correspondence should be addressed.
Drones 2026, 10(5), 391; https://doi.org/10.3390/drones10050391
Submission received: 23 March 2026 / Revised: 16 May 2026 / Accepted: 18 May 2026 / Published: 20 May 2026
(This article belongs to the Section Drone Communications)

Highlights

What are the main findings?
  • In this study, we design an authentication architecture for unmanned eVTOL emergency rescue using drones as communication relays.
  • Our lightweight and high-security design leverages PUFs embedded in drones, unmanned eVTOLs, and the dispatching center.
What are the implications of the main findings?
  • Our protocol enables the safe and efficient execution of rescue missions, even in complex urban environments, and ensures continuity and reliability for actual emergency rescue operations, even under extreme conditions such as 5G signal dead zones.

Abstract

While drones play important roles in areas such as communication and logistics delivery, they have certain limitations in emergency rescue scenarios due to their inability to carry passengers. Building on mature drone technologies such as autonomous flight and environmental perception, unmanned passenger Electric Vertical Take-off and Landing (eVTOL) aircraft are designed with a manned cabin, enabling them to operate without an onboard pilot while rapidly transporting injured people. Consequently, eVTOLs can play a significant role in emergency rescue that cargo-only drones cannot fulfill, as they are capable of rapidly reaching emergency scenes, effectively overcoming the delays caused by traditional ground traffic congestion. Despite their potential, eVTOLs still face several critical obstacles, including signal disruption, limited coverage of dispatching centers, mutual authentication among entities, and concerns related to security and privacy preservation. As a remedy, this paper presents a lightweight authentication protocol leveraging drone assistance to overcome these challenges for unmanned eVTOL emergency rescue. In scenarios where an unmanned eVTOL experiences signal blockage due to dense urban high-rise structures, neighboring drones can serve as a transmission relay to assist the unmanned eVTOL and the dispatch center (DC) in completing mutual authentication and session key negotiation, thereby enabling the unmanned eVTOL to safely complete its mission. To enhance security, physical unclonable functions (PUFs) are integrated into unmanned eVTOLs, drones, and the DC, safeguarding sensitive data against side-channel and physical capture attacks while preserving the confidentiality of unmanned eVTOL identities to mitigate privacy risks. Our protocol achieves provable security in the random oracle model while exhibiting strong resistance to various well-known attacks. Comparative analysis with the existing drone authentication and drone-assisted emergency rescue authentication protocols reveals that our protocol not only provides stronger security guarantees but also maintains a low computational overhead.

1. Introduction

With the acceleration of global urbanization, urban population density continues to rise, and traditional ground transportation systems face increasingly severe challenges in emergency rescue scenarios. Issues such as ground traffic congestion, complex road conditions, and restricted access for emergency vehicles often lead to delays in critical rescue windows, directly endangering the lives of injured individuals. According to statistics from the World Health Organization, approximately 30% of trauma-related deaths occur within four hours of injury, and rescue response speed is a key factor determining the survival rate [1]. Against this backdrop, exploring novel rapid emergency rescue mechanisms has become an urgent priority in the field of urban public safety.
The emergence of the Advanced Air Mobility concept offers a transformative solution for urban emergency rescue [2]. Drones play an important supporting role in emergency rescue, as they are capable of undertaking tasks such as disaster reconnaissance, communications relay, and material delivery, providing real-time information support for rescue command. However, due to their lack of manned capability, drones cannot be used directly in scenarios requiring personnel transport or on-site emergency response. The technical framework of unmanned eVTOLs is based on mature drone technologies, with core technologies such as autonomous flight control, environmental perception, and path planning originating from long-term developments in the field of drone design. As an important extension and upgrade of unmanned systems, unmanned eVTOLs have inherited the intelligent and autonomous characteristics of unmanned systems while compensating for the shortcomings of drones in manned capability. A manned cabin is specifically incorporated into the design, enabling the eVTOL to rapidly transport injured personnel without the need for an onboard pilot. While standard drones are limited by their inability to carry passengers in emergency rescue scenarios and can only perform auxiliary tasks such as delivering medical supplies, unmanned manned-capable eVTOLs can serve as “flying ambulances” by directly transporting injured individuals, achieving a capability leap for unmanned systems from “supporting role” to “core role.”
Due to their vertical take-off and landing capabilities, low-altitude flight characteristics, and electric propulsion advantages, unmanned eVTOL aircraft can overcome ground transportation bottlenecks and establish a three-dimensional emergency rescue network [3]. Compared to traditional ground ambulances, unmanned eVTOLs can reduce urban emergency medical response times from tens of minutes to just a few minutes, significantly improving the survival probability of injured individuals [4]. Unmanned eVTOL emergency rescue systems can cover multiple application scenarios, including urban trauma first aid, emergency transport of acute patients, urgent medical supply delivery, and personnel evacuation from disaster sites, forming an air–ground coordinated three-dimensional emergency support system.
The effective operation of unmanned eVTOL emergency rescue systems heavily relies on reliable air–ground communication networks. During rescue mission execution, unmanned eVTOLs need to transmit real-time high-definition video captured by onboard cameras, real-time vital signs of injured individuals, flight routes, and environmental perception data back to the ground dispatching center, enabling ground command personnel to accurately assess the situation and make informed decisions. Fifth-generation mobile communication technology, with its high bandwidth, low latency, and high reliability characteristics, provides technical support for real-time data transmission between unmanned eVTOLs and dispatching centers. However, in complex urban environments, areas such as dense high-rise districts, tunnels, and underground spaces often experience 5G signal coverage gaps, leading to direct communication link interruptions between unmanned eVTOLs and dispatching centers. In such scenarios, maintaining communication continuity and data security becomes a critical issue requiring urgent resolution.
Communication interruptions not only affect the effective execution of rescue missions but may also introduce severe security risks. Communications between unmanned eVTOLs and dispatching systems rely on open low-altitude wireless channels, making them vulnerable to various network attacks, including eavesdropping, tampering, replay attacks, and false data injection. Attackers may interfere with or hijack communication links to tamper with flight instructions, forge patient data, or steal sensitive information, directly threatening rescue mission safety and patient privacy. Existing UAV authentication protocols mostly assume continuous ground station coverage and fail to adequately consider relay authentication requirements in communication-limited scenarios. Meanwhile, centralized authentication mechanisms exhibit significant limitations in cross-airspace handovers and areas lacking infrastructure. Therefore, designing a lightweight security authentication protocol capable of adapting to communication coverage limitations and supporting relay forwarding holds significant theoretical value and practical importance for ensuring the reliable operation of unmanned eVTOL emergency rescue systems.
Motivation and contributions: The integration of unmanned eVTOL aircraft into urban emergency rescue systems presents a transformative opportunity to significantly reduce response times and enhance public safety outcomes. However, the reliable operation of such systems fundamentally depends on secure and continuous air–ground communications. Most of the existing research on eVTOLs has focused on areas such as flight dynamics, path planning, battery management, and airworthiness certification, rather than security authentication protocols. In this paper, we design an authentication protocol for emergency rescue scenarios following earthquakes or major traffic accidents, where communication is constrained, drones are needed to serve as transmission relays, and unmanned manned-capable eVTOLs are required to perform special emergency rescue missions. To achieve this, we propose a drone-assisted lightweight authentication protocol for unmanned eVTOL emergency rescue. Our main contributions are as follows:
  • Novel Drone-Assisted Authentication Architecture for Unmanned eVTOL Emergency Rescue: We propose an authentication protocol specifically designed for unmanned eVTOL emergency rescue scenarios to address the issue of direct communication unavailability with the dispatching center. The protocol enables secure three-party authentication among the unmanned eVTOL, relay drone, and dispatching center, with all messages transmitted via the relay node throughout the authentication process, ensuring that rescue operations can be securely conducted even in complex urban environments.
  • Practical Design for Urban Emergency Rescue Scenarios: Unlike existing schemes that assume continuous infrastructure coverage, our protocol fully considers the communication constraints commonly encountered in real-world rescue environments, such as signal blockage caused by urban high-rise buildings and dead zones. The relay-assisted mechanism ensures that authentication and key agreement can still be completed under extreme conditions, including 5G signal dead zones, directly supporting the continuity and reliability requirements of actual emergency rescue missions.
  • PUF-Based Lightweight Security Design: By leveraging PUFs embedded in each unmanned eVTOL, drone, and DC, our protocol achieves lightweight authentication without requiring complex cryptographic operations. The PUFs’ challenge–response mechanism provides inherent resistance against physical tampering and enables efficient key generation suitable for resource-constrained aerial platforms.
  • Strong Security and High Computational Efficiency: This proposed scheme provides mutual authentication and session key negotiation while withstanding common threats including MITM, replay, and impersonation attacks, while also achieving anonymity and untraceability for unmanned eVTOL identities during relay communications. Compared with some related schemes, our protocol delivers strong security with reduced costs in computation, communication, and storage.

2. Related Work

As an emerging technology, unmanned aerial vehicles (UAVs) have attracted extensive research interest. Although Hooper et al. [5] proposed a multi-layer architecture aimed at protecting commercial drones from DoS and ARP poisoning threats, their approach lacked rigorous formal verification. In 2017, Blazy et al. [6] designed an efficient security protocol for UAV systems, but it failed to adequately resist replay attacks. In 2018, to safeguard real-time UAV data, Cheon et al. [7] proposed the use of homomorphic authenticated encryption technology, albeit at the cost of significant computational overhead. In 2019, TCALAS was presented by Srinivas et al. [8] as a lightweight protocol based on temporary credentials; it was later shown to be susceptible to time asynchrony attacks. Operating on the belief that edge nodes are trustworthy, Gope and Sikdar [9] put forward a PUF-enabled key agreement mechanism that maintains privacy within the edge-assisted IoD environment. Zhang et al. [10] presented a lightweight symmetric key protocol requiring ground station participation in every session, thereby introducing a potential single point of failure. In 2021, Alladi et al. [11] designed a Drone-MAP leveraging 5G technology, characterized by session-specific identity updates, yet it remained susceptible to internal threats. In 2022, Wu et al. [12] advanced this research direction but encountered issues with excessive handover overhead.
With the advancement of UAV technology, traditional user-to-UAV authentication protocols are no longer well-suited to current scenarios. Coupled with issues such as user device loss and password leakage, direct UAV-to-UAV authentication has become critically important. In 2020, Yazdinejad et al. [13] sought to address the problem of centralized trust by utilizing blockchain technology to achieve UAV authorization through a public blockchain; however, their method suffered from consensus delay and excessive computational overhead. In 2021, Feng et al. [14] constructed a cross-domain authentication scheme employing threshold signatures and smart contracts, computationally expensive operations are incurred by its extensive employment of Elliptic Curve Cryptography. Khan et al. [15] presented a mechanism built upon hyperelliptic curves to address UAV-enabled Intelligent Transportation Systems (ITSs), but it was later found vulnerable to impersonation attacks. Xiao and Tao [16] introduced SLAKA-IoD, which supports both U2G and U2U authentication, though U2U sessions require GS participation, making the system vulnerable to ground station compromise. In 2022, Masuduzzaman et al. [17] proposed BUST, a traffic management solution that stores authentication logs but does not include active entity authentication. In the same year, Yu et al. [18] developed SLAP-IoD, a lightweight, PUF-based protocol resistant to UAV capture, but it assumes continuous ground connectivity for CRP updates. Also in 2022, Lounis et al. [19] designed a D2D-MAP employing PUFs, yet it transmits identities in plaintext. In 2023, Karmakar et al. [20] proposed UAAS, combining PUFs with a fuzzy extractor, which presents a risk of permanent identity leakage. In 2024, Pu et al. [21] designed an application-aware anonymous protocol using PUFs, but it still relies on centralized components. In 2025, Guo et al. [22] proposed AHA-BV, a scheme supporting batch verification for satellite–terrestrial networks, primarily addressing satellite access issues. Guo et al. [23] developed the N3PA-STIN scheme to enable many users to access networks that combine satellite and ground components, but it faces challenges of high overhead and semi-trusted satellite risks.
Since traditional vehicular network authentication protocols rely on roadside units (RSUs) [24,25], in emergency rescue scenarios, these protocols often encounter problems such as damaged RSUs or a lack of deployment. Consequently, utilizing UAVs as mobile relay nodes to assist in vehicular network authentication has emerged as a novel research direction. In 2022, El-Zawawy et al. [26] proposed an ECC-based UAV-assisted V2V authentication scheme, yet it lacks message integrity guarantees. In 2024, Miao et al. [27] contributed an ECC-based protocol for UAV-assisted vehicular networks that provides conditional privacy, but is vulnerable to physical capture attacks. In 2025, Nyangaresi et al. [28] built a PUF-biometric-ECC authentication protocol for the IoD and claimed it can withstand numerous attacks.
Recently, many researchers have also conducted studies in the field of emergency rescue. In 2022, Wu et al. [29] proposed an edge computing-enabled protocol to maintain available communication for the Internet of Vehicles in rural or disaster areas, providing anonymity and identity traceability, while remaining vulnerable to UAV capture attack. Next year, Liu et al. [30] proposed a UAV-assisted signature scheme for VANETs based on trusted hardware assumptions. In 2024, for the Internet of Vehicles (IoV), Wang et al. [31] introduced a UAV-assisted protocol leveraging PUFs and ECC. However, this scheme suffers from relatively high overhead. In 2025, Xie et al. [32] presented a PUF-based cross-domain anonymous rescue scheme that eliminates the online control center but only supports UAV-ground authentication, not UAV-UAV. Wang et al. [33] designed a UAV swarm rescue protocol that uses the Chinese remainder theorem and chameleon hashing, removing the trusted authority and achieving mutual authentication between UAVs and base stations. Ying et al. [34] introduced a secure and efficient V2ES (Vehicle-to-Edge Server) authentication protocol designed for connected autonomous vehicles, which they integrated with a Faster R-CNN-based object detection scheme. Their study emphasizes a synergistic approach that balances secure edge service access with perception-related tasks, while also exploring efficiency enhancements for real-world deployment, and their primary emphasis lies in V2ES/edge interactions and the fusion of sensing capabilities. Li et al. [35] proposed a rescue-vehicle security scheme using certificateless cryptography to handle both scheduling and access authentication, enabling mutual authentication and key agreement with roadside units to ensure reliable information exchange. However, it remains limited by delays caused by road congestion. In 2026, Xie et al. [36] designed an emergency vehicle avoidance protocol based on ECC, a fuzzy extraction algorithm, and a PUF, enabling avoidance messages to be forwarded to ordinary vehicles before the arrival of emergency vehicles. Compared with related emergency vehicle avoidance protocols, it achieves better security and higher efficiency. Additionally, it adopts a server function partitioning and distributed registration center approach to reduce the burden and risk on the trusted authority during authentication. However, this scheme relies heavily on edge servers.
The existing works exhibit key limitations: cryptography-based schemes are efficient but vulnerable to physical attacks where compromised UAVs reveal all secrets; blockchain-based approaches introduce latency unsuitable for real-time authentication; PUF-based protocols enhance physical security yet suffer from ground connectivity dependence and anonymity gaps; UAV-assisted vehicular protocols neglect UAV security by assuming that UAVs are trustworthy. Table 1 summarizes notable related works from the recent five years.

3. System and Adversary Models

3.1. System Model

Figure 1 illustrates the proposed system model, which consists of three entities: the unmanned rescue eVTOLi, the relay Dronej, and the dispatching center (DC).
When the unmanned eVTOLi experiences disrupted direct communication with the DC or flies outside the DC’s coverage area, it randomly selects a surrounding drone as the transmission relay and sends an authentication and message transmission request to that relay drone. With the assistance of Dronej, the unmanned rescue eVTOLi performs authentication with the DC, negotiates a session key, and transmits real-time high-definition video captured by its onboard camera, real-time vital signs of injured individuals, and flight routes back to the DC. It can also deliver supplies, rescue injured personnel, etc., according to the instructions from the DC.
Dronej serves as a relay node to assist the unmanned eVTOLi in completing mutual authentication with the DC when the signal of the unmanned eVTOLi is obstructed. Simultaneously, Dronej itself completes mutual authentication and session key negotiation with both the unmanned eVTOLi or DC. To address the single point of failure issue, an eVTOL can select any surrounding drone as a transmission relay as needed. Once the relay drone fails or is captured, and the eVTOL receives no feedback within an acceptable time threshold, it needs to resend the authentication request or select another drone as the transmission relay.
The dispatching center possesses strong computing power and storage capacity, both of which are deployed reliably, and serves to handle real-name registration of the unmanned eVTOLi and Dornej, maintaining the mapping between their real and anonymous identities and analyzing, assessing, and making decisions based on the information transmitted back by the unmanned eVTOLi and Dronej.

3.2. Adversary Model

By combining the Dolev–Yao (DY) model [37] with the practical application scenarios of unmanned eVTOLs, the attacker model for unmanned eVTOLs is defined as:
  • The adversary can listen to public channel transmissions, as well as tamper with, replay, or inject messages.
  • If an adversary can hijack the unmanned eVTOL and drone, they can analyze the stored information.
  • An adversary could compromise/capture the unmanned eVTOL and drone.
  • The adversary may compromise/capture the dispatching center (DC).
  • Only when examining perfect forward secrecy can adversaries be allowed to know the long-term private keys of users and servers.

4. Preliminary

In this section, we explain physical unclonable functions and one-way hash functions.

4.1. Physically Unclonable Function

A physical unclonable function (PUF) is a hardware security primitive that uses inherent physical variations in semiconductor devices to create unique, unpredictable challenge–response pairs [38]. Conceptually analogous to biometric identifiers in humans, PUFs serve as an intrinsic fingerprint for each individual silicon chip. Due to inevitable manufacturing process variations, Integrated Circuits (ICs) exhibit subtle but measurable differences in parameters such as propagation delay, threshold voltage, the gain factor, and other electrical characteristics. PUFs leverage these inherent physical discrepancies to derive device-specific cryptographic keys without the need for non-volatile memory storage.
Unlike traditional cryptographic mechanisms that rely on securely stored digital keys, PUFs implement a challenge–response authentication protocol at the physical level. Upon receiving an input challenge, the PUF generates a response determined by its unique physical microstructure, thereby rendering each circuit effectively unclonable. Moreover, any physical probing or invasive characterization of the PUF unavoidably disturbs its fundamental physical properties, thus modifying the challenge–response behavior and ensuring that sensitive information remains protected even when the device is compromised.
The integration of PUFs into unmanned eVTOL platforms offers a promising countermeasure against capture attacks, to which existing security protocols remain vulnerable. The intrinsic unpredictability of PUF guarantees that the following holds: even if an adversary physically compromises the unmanned eVTOL and extracts stored data, the PUF-protected cryptographic material cannot be replicated or reused. Furthermore, PUF computations are executed at the hardware level with operating frequencies in the MHz range, typically completing within sub-nanosecond intervals. This performance significantly surpasses software-based hash operations, which operate on millisecond timescales, rendering the computational overhead of PUFs negligible. Since PUF-based operations are confined within the unmanned eVTOL hardware, they impose no additional communication burden on the overall system architecture.
Different PUFs can be deployed in eVTOLs and relay drones. Unmanned manned-capable eVTOLs are large-scale, high-value platforms designed for emergency rescue missions. As the cost of a typical eVTOL airframe ranges from 200,000 to 2 million, the incremental cost of integrating a PUF, even a standalone hardware PUF chip (1–5), or utilizing the SRAM PUF that already exists in many microcontrollers, is negligible relative to the overall system cost. For relay drones (e.g., sub-$100 quadcopters), commercial off-the-shelf microcontrollers used in flight controllers (such as the STM32 series or i.MX RT series) already contain embedded SRAM PUFs, which leverage the random power-up state of SRAM cells as a unique fingerprint, incurring no additional hardware cost while providing reasonable environmental stability.

4.2. One-Way Hash Function

A fundamental tool in cryptographic systems is the one-way hash function (often abbreviated as hash function). Its operation takes an arbitrary-length message m and computes a fixed-length digest h = h ( m ) . The following essential properties characterize such a function:
1.
Fixed Output Length: No matter what finite length the input has, the hash value produced by H always possesses the same predetermined length.
2.
Preimage Resistance (One-Way Property): For a given hash result h, discovering any input m satisfying H ( m ) = h is computationally impossible. Hence, the function cannot be inverted.
3.
Collision Resistance: Finding any pair of distinct inputs m 1 and m 2 (where m 1 m 2 ) such that H ( m 1 ) = H ( m 2 ) .
4.
Second Preimage Resistance: It is practically infeasible for a specified m 1 , to discover a second distinct m 2 (where m 2 m 1 ) such that H m 1 = H m 2 .
5.
Pseudo-Randomness (Puzzle-Friendliness): The output of a hash function behaves like a random oracle, meaning there is no efficient method to predict or control the output value by strategically selecting the input.
Beyond these security properties, hash functions are designed to be computationally efficient, allowing for fast calculation of the hash value for any given input. This combination of security and efficiency makes them indispensable for various applications like integrity checking of data, digital signature generation, and password protection.

5. Proposed Protocol

This section details our proposed drone-assisted lightweight authentication protocol for unmanned eVTOL emergency rescue, which comprises three phases: system initialization, registration, and authentication and key agreement. A detailed summary of the notations employed throughout the protocol is provided in Table 2.

5.1. Initialization Phase

The dispatching center (DC) generates an elliptic curve E G F q , a base point P , and a secure hash function h ( ) . Its identity is I D D C , and its private and public keys are K D C and P K D C = K D C P .
The DC selects a challenge value a D C , computes R e s D C = P U F D C ( a D C ) , D D C = K D C h ( 1 R e s D C ) , and stores a D C D D C .
Finally, DC publishes the public parameters E G F q , P , h , I D D C , P K D C , Δ T .

5.2. Registration Phase

Figure 2 and Figure 3 show the registration processes for unmanned eVTOLs and drones, respectively.
  • Unmanned eVTOL Registration phase
  • Step ER1: The unmanned eVTOLi (I = 1, 2, 3… t) sends identity I D e i to the DC with a secure channel.
  • Step ER2: Upon reception of the I D e i , the DC generates timestamp T i and computes the following:
    R e s D C = P U F D C ( a D C )
    K D C = D D C h ( 1 | | R e s D C )
    B e i = h ( I D D C | | I D e i | | K D C )
    P I D e i = E K D C ( I D e i | | T i )
Then, the DC sends the message M 2 = { B e i , P I D e i } to the unmanned eVTOLi with the same channel.
  • Step ER3: Upon reception of the message M 2 = { B e i , P I D e i } , the unmanned eVTOLi generates challenge value C h a i and computes the following:
    R e s i = P U F ( C h a i )
    B V i = B e i h ( R e s i )
The unmanned eVTOLi stores { I D e i , C h a i , B V i , P I D e i } .
2.
Drone Registration phase
  • Step DR1: Dronej (j = 1, 2, 3… k) sends identity I D d j to the DC with a secure channel.
  • Step DR2: Upon reception of the I D d j , the DC generates timestamp T j and computes the following:
    R e s D C = P U F D C ( a D C )
    K D C = D D C h ( 1 | | R e s D C )
    B d j = h ( I D D C | | I D d j | | K D C )
    P I D d j = E K D C ( I D d j | | T j )
Then, the DC sends the message M 2 = { B d j , P I D d j } to Dronej on the same channel.
Step DR3: Upon reception of the message M 2 = { B d j , P I D d j } , Dronej generates challenge value C h a i   and computes the following:
R e s j = P U F ( C h a j )
B V j = B u j h ( R e s j )
Dronej stores { I D d j , C h a j , B V j , P I D d j } .

5.3. Authentication and Key Agreement Phase

In this section, we present the authentication and key agreement process. In Figure 4, the framework of the proposed AKA process shows the framework of the authentication process, and Figure 5 provides an elaborate depiction of the authentication and key agreement flow.
  • Step AK1: The unmanned eVTOLi computes
    R e s i = P U F ( C h a i )
    B e i = B v i h ( R e s i )
    then generates random number r 1 and timestamp T 1 . It then computes
    A 1 = r 1 P
    C 1 = h ( I D D C | | B e i | | P I D e i | | A 1 | | T 1 )
The unmanned eVTOL randomly selects a surrounding drone as the relay and sends M 1 = { I D D C , A 1 , C 1 , P I D e i , T 1 } to the selected relay drone through the public channel.
  • Step AK2: Upon receiving the message { I D D C , A 1 , C 1 , P I D e i , T 1 } , Dronej first generates timestamp T 2 and checks whether | T 2 T 1 | Δ T holds; if it holds, Dronej computes
    R e s j = P U F ( C h a j )
    B d j = B V j h ( R e s j )
    then generates random number r 2 and computes
    A 2 = r 2 P
    C 2 = h ( I D D C | | B d j | | P I D d j | | A 2 | | T 2 )
Dronej sends M 2 = M 1 , A 2 , C 2 , P I D d j , T 2 to the DC through the public channel.
  • Step AK3: Upon receiving the message M 2 , the DC first generates timestamp T 3 and checks whether | T 3 T 2 | Δ T holds; if it holds, it generates random number   r 3 and computes
    R e s D C = P U F D C a D C
    K D C = D D C h ( 1 | | R e s D C )
    D K D C ( P I D e i ) = I D e i | | T i
    B e i = h ( I D D C | | I D e i | | K D C )
    C 1 = h I D D C | | P I D e i | | A 1 | | T 1  
If C 1 C 1 , the process is aborted. Otherwise, it computes
D K D C ( P I D d j ) = I D d j | | T i
B d j = h ( I D D C | | I D d j | | K D C )
C 2 = h ( I D D C | | B d j | | P I D d j | | A 2 | | T 2 )
If C 2 C 2 , the process is aborted. Otherwise, it computes
P I D e i = E K D C ( I D e i | | T 3 )
P I D d j = E K D C ( I D d j | | T 3 )
C 3 = r 3 P
S K D C e i = h ( r 3 A 1 | | I D e i | | I D D C )
S K D C d j = h ( r 3 A 2 | | I D d j | | I D D C )
C 4 = E ( B d j ) ( I D e i | | P I D d j | | C 3 )
C 5 = E ( B e i ) ( I D d j | | P I D e i | | C 3 | | A 2 )
C 6 = h ( C 3 | | C 4 | | C 5 | | T 3 )
The DC sends M 3 = { C 4 , C 5 , C 6 , T 3 } to Dronej through the public channel.
  • Step AK4: On receiving the message { C 4 , C 5 , C 6 , T 3 } , Dronej first generates timestamp T 4 and checks whether | T 4 T 3 | Δ T holds; if it holds, it computes ( I D e i | | P I D d j | | C 3 ) = D ( B d j ) ( C 4 ) .
The pseudonymous identity is updated to P I D d j .
C 6 = h ( C 3 | | C 4 | | C 5 | | T 3 )
If   C 6 C 6 , the process is aborted. Otherwise, it generates T 4 and computes
S K d j D C = h ( r 2 C 3 | | I D d j | | I D D C )
S K d j e i = h ( r 2 A 1 | | I D d j | | I D e i )
C 7 = h ( S K d j e i | | A 2 | | C 3 | | C 5 | | T 4 )
Dronej sends M 4 = { C 5 , C 7 , T 4 } to the unmanned eVTOLi through the public channel.
  • Step AK5: Upon receiving the message { C 5 , C 7 , T 4 } , the unmanned eVTOLi first generates timestamp T 5 and checks whether | T 5 T 4 | Δ T holds; if it holds, it computes
    ( I D d j | | P I D e i | | C 3 | | A 2 ) = D ( B e i ) ( C 5 )
The pseudonymous identity is updated to P I D e i .
S K e i d j = h ( r 1 A 2 | | I D d j | | I D e i )
S K e i D C = h ( r 1 C 7 | | I D e i | | I D D C )
C 7 = h ( S K d j e i | | A 2 | | C 3 | | C 5 | | T 4 )
If C 7 C 7 , the process is aborted. Otherwise, it completes authentication and key agreement.

6. Formal Security Proof

In this section, we prove the security of our protocol in the random oracle model, analyzing the advantage of a PPT adversary A against its semantic security. The simulated advantage is negligible, confirming the scheme’s practically unbreakable security and adversarial resilience.

6.1. Definition of Random Oracle Model

Definition 1.
(Participants and Partnership): In our scheme, mutual authentication and key agreement involve the cooperation of three parties: namely, the dispatching center (DC), the unmanned eVTOLi (ei), and Dronej (dj). Together, they are referred to as "P". The following notation applies to the i-th instance:  I n P i , I n D C i , I n e i i , I n d j i . Participants with an identical session identifier  SID P I  are considered to belong to the same session. The partner identity of an unmanned eVTOLi  I n e i i  (or Dronej  I n d j i  ) is denoted as  P I D e i i  (or  P I D d j i  ). A participant P attains the state  A c c e p t p i  upon receiving a legitimate and valid request. An unmanned rescue eVTOLi  I n e i i  and relay Dronej  I n d j i  are defined as partners if the following conditions are satisfied:
(1)
Both participants are in the  Accept  state.
(2)
S I D e i i = S I D d j j .
(3)
P I D e i i = I n d j i  and  P I D d j i = I n e i i .
Additionally, the session keys negotiated by both parties must be identical, i.e., S K e i i = S K d j .
Definition 2.
(Query): To simulate the capabilities of an adversary  A , the following queries are defined:
  • Execute Query ( I n P i ): When this query is executed,  A  can obtain all publicly transmitted parameters.
  • Send Query ( I n P i , m ):  A  sends a message m to  I n P i . If m is legitimate and correct,  I n P i  responds to the message; otherwise, it is ignored.
  • Reveal Query ( I n e i i , I n d j i ): If the test query has not been executed and the session keys  S K e i i  and  S K d j  have been negotiated,  A  can obtain the session key by executing this query.
  • Corrupt Query ( I n e i i ): The user’s mobile device stores parameters  { A 1 , A 2 , Rep · , n } ;  A  can obtain these parameters by executing this query.
  • Test Query ( I n e i i , I n d j i , r ): This query first creates a random bit r. When a session key has been generated and r = 1, A receives the real session key; when r = 0, A receives a random number. If no session key exists, an empty string is returned. The query is limited to a single execution.
Definition 3.
(Freshness): An instance is deemed fresh when it meets all of the criteria listed below:
(1)
The reveal query is never made, and the corrupt query is made at most once.
(2)
The states of both  I n e i i  and  I n d j i  are Accept.
Definition 4.
(Semantic Security): A random bit  r guess  is generated to guess the bit r generated by the Test query. If  r guess = r , it indicates that A has determined whether the test query returned the correct session key, and the semantic security of protocol  Π  is compromised. The probability of this event is defined as  Adv Π A = | 2 Pr [ r guess = r ] 1 | = | 2 Pr [ Siccess A ] 1 | . If  Adv Π A < η , where  η  is a negligible value, then  Π  is considered to possess semantic security.

6.2. Formal Proof

Theorem 1.
We define  Adv Π A  as the advantage of a PPT adversary A in breaking protocol Π’s semantic security. Assume that A makes at most  q h a s h  queries to the hash oracle,  q s e n d  to the send oracle, and  q e x e  to the execute oracle. Furthermore, let  l hash  and  l nonce  denote the bit lengths of the hash output and the nonce, respectively. The advantage is then bounded as:
Adv Π A q hash 2 2 l hash + ( q exe + q send ) 2 2 l nonce 1 + 2 q hash · ( Adv A ECDLP + 1 2 l hash )
Proof. 
Consider a sequence of games G a m e i that captures the semantic security attacks of A . Define S u c c e s s i as the event where A violates Π ’s semantic security in G a m e i . The games are described as follows:
Game 0 : This simulates a real attack launched by A . The adversary first selects a random bit r guess . According to the definition, we have the following:
Adv Π A = | 2 Pr [ Success 0 ] 1 |
Game 1 : This corresponds to the setting where A initially runs an execute query to retrieve public communication content. As the last step, A conducts a test query to distinguish the actual session key from a random value. The session key in our protocol is referred to as S K d j D C = h ( r 2 C 7 | | I D d j | | I D D C )   S K e i d j = h ( A 2 r 1 | | I D d j | | I D e i )   S K e i D C = h ( r 1 C 7 | | I D e i | | I D D C ) . Among the intercepted messages, A 1 and A 2 are associated with the session key. Nevertheless, the hardness of the CDHP prevents A from linking the intercepted messages to the session key. Consequently, despite having access to all public communication, A remains unable to verify the correctness of the returned session key.
Based on the above analysis, it follows that
P r [ S u c c e s s 1 ] = P r [ S u c c e s s 0 ]
Game 2 : In the proposed protocol, messages consist of hash values, the results of exclusive OR (XOR) operations, and nonce. This simulation involves adversary A executing execute queries to obtain messages, followed by send and hash queries to launch collision attacks. By the birthday paradox, the upper bound on the probability of a hash collision equals q h a s h 2 2 l h a s h + 1 . Simultaneously, the probability of a nonce collision is q h a s h 2 2 l h a s h + 1 . Therefore, it can be concluded that
P r [ S u c c e s s 2 ] P r [ S u c c e s s 1 ] q hash 2 2 l hash + 1 + ( q exe + q send ) 2 2 l nonce
Game 3 : In the proposed protocol, A executes Corrupt Query ( I n e i i ) to obtain the stored information { I D e i , C h a i , B V i , P I D e i } in the unmanned eVTOL, where R e s i = P U F ( C h a i ) and B V i = B e i h ( R e s i ) . To obtain the critical parameters, A has two options: guess B e i or break the PUF. Let Adv P U F A be the probability of the latter event. Then we get
P r [ S u c c e s s 3 ] P r [ S u c c e s s 2 ] q s e n d   A d v P U F A
Game 4 : In the proposed protocol, based on the CDHP and a cryptographic hash function, the protocol generates three session keys: S K d j D C = h ( r 2 C 7 | | I D d j | | I D D C )   S K e i d j = h ( A 2 r 1 | | I D d j | | I D e i )   S K e i D C = h ( r 1 C 7 | | I D e i | | I D D C ) The simulation models A ’s attempts to compute these keys after issuing execute and h a s h queries. In scenario one, A performs a hash collision attack, whose maximum probability is q h as h 2 l h as h . In the second scenario, given A 1 = r 1 P , A 2 = r 2 P and C 7 = r 3 P , A attempts to compute r 1 C 7 , with a maximum probability of q h as h · Adv A ECDLP , where Adv A ECDLP < η and η is sufficiently small. Therefore, we obtain
P r [ S u c c e s s 4 ] P r [ S u c c e s s 3 ] q h as h · ( Adv A ECDLO + 1 2 l h as h )
From the preceding analysis, adversary A derives zero advantage when trying to predict the random bit r, i.e.,
P r [ S u c c e s s 4 ] = 1 2
According to Equation (33),
1 2 Adv Π A = | Pr [ S u c c e s s 0 ] 1 2 |
By combining the above equations, we can conclude that
1 2 Adv Π A = P r [ S u c c e s s 1 ] P r [ S u c c e s s 4 ] P r [ S u c c e s s 1 ] - P r [ S u c c e s s 2 n ] + P r [ S u c c e s s 2 ] P r [ S u c c e s s 3 ] + P r [ S u c c e s s 3 ] ] - P r [ S u c c e s s 4 ] .
That is,
Adv Π A q hash 2 2 l hash + ( q exe + q send ) 2 2 l nonce 1 + 2 q hash · ( Adv A ECDLP + 1 2 l hash )

6.3. Formal Security Verification Using ProVerif

ProVerif is a fully automated tool that formally analyzes the security of cryptographic protocols. Recently, as authentication protocols have become widely deployed across many domains, ensuring their security has grown increasingly critical. Nevertheless, the complexity and often untrusted nature of real-world deployment environments make many protocol attacks hard to detect or prevent by manual review alone. To overcome this issue, Bruno Blanchet designed ProVerif—an automatic formal verifier based on the Dolev–Yao [37] model. This tool supports a broad range of cryptographic primitives, including hash functions, Diffie-Hellman key exchange, and public-key encryption. It can verify confidentiality properties and identify potential vulnerabilities; when a flaw exists, the tool outputs a corresponding attack trace.
In our verification, we first define the communication channels, basic data types, and several operations (hash, elliptic-curve, and physical unclonable functions) in Figure 6. Figure 7 defines attack events and regular events together with their logical relationships. The execution flow of the unmanned eVTOL is depicted in Figure 8, and within our proposed scheme, the eVTOL follows the steps shown in Figure 8 to complete authentication. Similarly, the processes of the drone and the dispatching center are presented in Figure 9 and Figure 10, respectively. Figure 11 illustrates the overall flow. The results in Figure 12 show that the attacker cannot obtain the session keys S K d j D C , S K e i d j , and S K e i D C , the unmanned eVTOL identity I D e i , the drone identity I D d j , or the DC private key K D C , thereby proving that our protocol is resilient to attacks on these parameters, and that the underlying logic is valid and workable.

7. Informal Security Analysis

  • Verification Table Theft Attack
Since the proposed protocol does not store a verification table in the unmanned eVTOL, drone, or dispatching center, the protocol is resistant to verification table theft attacks.
2.
Replay Attack
In the proposed scheme, each message transmission is combined with a timestamp and a random nonce (or secret parameter), forming a dual verification mechanism of timestamp and secret parameter. When an attacker replays an intercepted message, the protocol first ensures the timestamp is still fresh. For replays that occur within ΔT, it also checks whether the random number or secret parameter carried by the message is correct.
Specifically, M 1 contains timestamp T 1 , a random nonce r 1 , and secret parameter B e i (contained in C 1 ), which is verified by the DC. Message M 2 similarly contains timestamp T 2 , a random nonce r 2 , and the shared secret parameter B d j (contained in C 2 ), which is also verified by the DC.
Since the random numbers or secret parameters are single-use and unpredictable, even if an attacker successfully replays a message within the time window, the authentication will fail due to parameter mismatch, and the session key cannot be obtained. Therefore, the proposed scheme can resist replay attacks.
3.
Physical Capture Attack
Once a relay drone is captured, the attacker will attempt to obtain the secret values of the relay drone. Since PUFs are designed to be tamper-resistant, physical probing will irreversibly alter the challenge–response behavior of the PUF. Moreover, the relay drone’s PUF is used only for the relay drone’s own authentication to the DC and does not store any secret values of the eVTOL or the DC. Therefore, capturing a relay does not compromise past or future sessions between the eVTOL and the DC. On the other hand, if the captured relay drone affects message transmission, the eVTOL will continue to send authentication requests to surrounding relay drones after the tolerance time threshold is exceeded, thereby minimizing the impact on the rescue mission.
4.
Impersonation Attacks
If an attacker captures and attempts to impersonate an unmanned eVTOL, they would need to know B e i . On the unmanned eVTOL side, B e i is protected by the PUF, making it impossible for the attacker to compute B e i . Therefore, the attacker cannot impersonate the unmanned eVTOLi.
For the same reason, the attacker cannot obtain the secret parameters B d j and K D C stored inDronej and the DC, and thus cannot launch impersonation attacks.
5.
Forgery Attacks
Assume that attacker A attempts to authenticate as an unmanned eVTOL. During the authentication phase, the attacker must forge { B e i , P I D e i , r 1 , T 1 } , but r 1 is a random nonce, P I D e i is the pseudonymous identity of the unmanned eVTOL, B e i = B V i h ( R e s i ) , P I D e i = E K D C ( I D e i T i ) , and P I D e i is updated after authentication. Since the attacker does not know B e i and P I D e i , they cannot compute the correct C 1 . Here, B e i cannot be forged by A because it is protected by the PUF. Therefore, the attacker cannot successfully forge the user identity.
Similarly, forging a relay drone is also infeasible because its B d j is also protected by the PUF. Furthermore, the attacker cannot forge messages to pass authentication, as the identity authentication information from the unmanned eVTOLi, Dronej, and the DC conceals shared secrets. Without knowledge of these shared secrets, any forgery attack is bound to fail.
6.
Know Session Key Attack
The session keys S K D C e i = h ( r 3 A 1 | | I D e i | | I D D C ) , S K D C d j = h ( r 3 A 2 | | I D d j | | I D D C ) , and S K e i d j = h ( r 1 A 2 | | I D d j | | I D e i ) . Session key establishment relies on the ECDLP and a cryptographic hash function. An adversary who acquires these session keys remains unable to derive any long-term keys.
7.
Perfect Forward Secrecy
Assume an attacker has obtained all the long-term keys. Since the session key S K D C e i = h ( r 3 A 1 | | I D e i | | I D D C ) is negotiated based on the Computational Diffie–Hellman Problem (CDHP), the attacker cannot obtain the nonce r 1 and r 3 or compute r 1 · r 3 · P . Therefore, the proposed protocol guarantees perfect forward secrecy. Even when an adversary knows all long-term keys, they cannot recover any previously established session key.
8.
Session Key Secrecy
Because the session keys are S K D C e i = h ( r 3 A 1 | | I D e i | | I D D C ) , S K D C d j = h ( r 3 A 2 | | I D d j | | I D D C ) , and S K e i d j = h ( r 1 A 2 | | I D d j | | I D e i ) , they do not appear in any authentication messages. r 3 · r 1 · P , r 3 · r 2 · P , and r 1 · r 2 · P are Diffie–Hellman values. Therefore, the Computational Diffie–Hellman Problem (CDHP)’s hardness prevents an adversary from deriving the session key.
9.
Man-in-the-Middle (MITM) Attack
Mounting a man-in-the-middle attack against the proposed scheme would require the adversary to both capture and modify the transmitted messages. Nevertheless, as previously outlined, messages such as M 1 = { I D D C , A 1 , C 1 , P I D e i , T 1 } and M 3 = { C 4 , C 5 , C 6 , T 3 } , are confidentiality-protected, and their integrity is safeguarded by cryptographic mechanisms. Consequently, while an adversary may be capable of intercepting these messages, any attempt to modify them would be detected or rendered infeasible due to the employed security primitives. Thus, MITM attacks cannot compromise the proposed scheme.
10.
Desynchronization Attack
In our protocol, first, during the AKA phase, the dispatching center (DC), the drone, and the eVTOL ensure message freshness by checking timestamps and secret parameters. At the same time, if a session cannot be completed normally due to message interception or packet loss, the eVTOL will reselect a relay drone to reinitiate the session. Second, the DC maintains forward security and anonymity with the eVTOL/drone by updating pseudonymous identifiers (PIDs). Specifically, each time after generating a session key, the DC generates a new pseudonym and sends it to eVTOLi and Dronej, and the device subsequently replaces the old pseudonym with the new one. This update process relies on the transmission of messages M3/M4. When an attacker blocks and intercepts M3/M4, due to the construction of pseudonyms as P I D e i = E K D C ( I D e i | | T i ) and P I D d j = E K D C ( I D d j | | T j ) , the DC does not need to maintain any mapping table between pseudonyms and real identities. When a device initiates an authentication request using an old pseudonym, the DC can decrypt the pseudonym to obtain the device’s real identity and process the request normally. Even if the device fails to receive the latest pseudonym update, the DC can still identify the device and re-assign a new pseudonym to it after generating the session key. Therefore, even if an attacker successfully implements packet loss or interception, our protocol can still achieve implicit state synchronization through the DC’s decryption capability, inherently resisting desynchronization attacks by design, thereby ensuring the availability and robustness of the protocol.
11.
Anonymity and Unlinkability
The proposed scheme ensures both anonymity and unlinkability for participating entities. In each session, the unmanned eVTOLi and Dronej generate a fresh pseudo-identity, which is cryptographically uncorrelated to their real identities and to the pseudo-identities used in other sessions. As a result, these pseudo-identities provide strong anonymity and prevent any linking of different sessions to the same entity. Furthermore, all transmitted messages are dynamically composed using timestamps and random nonces, ensuring that no two sessions produce linkable message patterns. This design effectively thwarts both identity disclosure and trajectory tracking attacks.
12.
Insider Attack
The use of a PUF ensures that secret parameters within the unmanned eVTOLi and Dronej remain unreachable to any attacker, whether internal or external. Hence, our solution withstands privileged insider attacks.
13.
Mutual Authentication
Messages M 1 and M 4 enable mutual authentication between the unmanned rescue eVTOLi and both the relay Dronej and the DC. Meanwhile, M 2 and M 3 serve to establish mutual authentication between the relay Dronej and the DC.

8. Performance Evaluation

In this section, we conduct a comparative analysis between our proposed protocol and the existing schemes within the domains of UAV authentication and UAV-assisted authentication.

8.1. Security Comparison

Table 3 compares the security of our scheme with related protocols [25,27,28,31,32,33], and the results show that our scheme achieves a higher security. The reason for selecting these references is that there is currently no authentication protocol specifically designed for eVTOLs, while the selected schemes either provide corresponding solutions for similar specific scenarios or adopt relevant key technologies, and each of these papers offers valuable insights. In refs. [25,27], the protocol does not deploy PUFs in the USP or devices to protect secret information. Once an attacker launches a side-channel attack or captures a USP or device, the attacker can launch various attacks, such as impersonation attacks. In ref. [28], because the authentication request { P I D i , D 1 , D 2 , D 3 } is unchanged in each session and therefore exhibits linkability. In ref. [31], the scheme is similar to our assumed target scenario. However, in its authentication process, the session key structure is S K j l = H ( r 1 | | r 2 | | P I D j | | P I D l | | C h j ) . Once the long-term private keys and fixed secret values of the control center (CC) and the drone are obtained by an attacker, the attacker can recover the pseudonym (PID) and ( r 1 , r 2 ) thereby compute the session key. Therefore, this protocol cannot guarantee perfect forward secrecy. The authors of ref. [33] propose an AKA scheme between drones and a ground station for secure communication between drone swarms in emergency rescue operations. However, this scheme also does not deploy PUFs in the devices to protect secret information. Therefore, once an attacker launches a side-channel attack or captures a device, the attacker can launch various attacks, such as impersonation attacks. Hence, this scheme cannot effectively resist physical capture attacks; once an attacker captures a drone, the system’s security will be severely compromised.

8.2. Computational Cost

Table 4 presents the experimental running times of various operations under the experimental environment of a Raspberry Pi 4B (quad-core 64-bit ARM Cortex-A72, 1.5 GHz, 2-GB LPDDR4 SDRAM), where T h ,   T ECC ,   T PUF ,   T eca   and   T enc / dec represent the costs of executing a “one-way hash function”, “elliptic curve scalar multiplication”, “physical unclonable function”, “elliptical curve addition” and “symmetric key encryption/decryption”, respectively. The bitwise XOR operation is negligible, as it is considerably lower compared to other operations.
We chose this experimental environment because the Raspberry Pi 4B (quad-core ARM Cortex-A72) is representative of high-end UAV onboard computers, given that both are based on the ARMv8-A architecture. This ensures similarity in fundamental arithmetic logic and memory access patterns. However, compared to typical flight controllers, the Raspberry Pi provides greater power and thermal headroom. Consequently, our experimental results represent a performance upper bound; in actual UAV deployments, moderate additional delays may arise from power constraints or real-time task preemption.
Table 5 compares the computational overhead of our protocol against that of existing related schemes. As illustrated, the PUF and ECC-based V2G communications in [25] demonstrate a computational overhead of 27.783 ms, and the UAV-assisted vehicle authentication protocols reported in [27] demonstrate a computational overhead of 27.294 ms. The cost-effective PUF- and ECC-based authentication protocol reported in [28] demonstrates an overhead of 26.19 ms. The scheme in [31] utilizes UAVs as relay nodes in an airborne backup network within post-disaster emergency communication networks to assist emergency communication vehicles, with an authentication protocol overhead of 33.318 ms. The representative PUF-based IoD authentication scheme presented in [32] exhibits an overhead of 27.72 ms, whereas the schemes in [33], with an authentication protocol for UAV swarms in emergency rescue missions, have an overhead of 36.639 ms. In contrast, the proposed protocol requires only 26.748 ms. While the computational overhead of our proposed protocol is marginally higher than that of [28], in a drone relay network scenario, the computing capabilities of eVTOLs, UAVs, and the DC are sufficient to handle authentication requests. The computational resources required by our protocol are far lower than the available computing power of typical onboard equipment, thus fully meeting the real-time demands of actual emergency communication.

8.3. Communication Cost

The volume of exchanged information is another factor that affects communication efficiency. In our environment, the lengths are set as follows: SHA-256 outputs 256 bits, AES-128 symmetric encryption works with 128 bits, an ECC point is defined as 160 bits, and a random number is 256 bits. Additionally, identity, password, counter, and timestamp each have a length of 16 bits. In the AKA phase, the cost in our protocol is { I D D C , A 1 , C 1 , P I D e i , T 1 } + I D D C , M 1 , A 2 , C 2 , P I D d j , T 2 + { C 4 , C 5 , C 6 , T 3 } + { C 5 , C 7 , T 4 } = { 16 + 160 + 256 + 16 + 16 } + 16 + 464 + 160 + 256 + 16 + 16 + { 128 + 128 + 256 + 16 } + { 128 + 256 + 16 } = 2320 bits. Moreover, the communication time overheads for [25,27,28,31,32,33] are 2336 bits, 3088 bits, 2128 bits, 2976 bits, 752 bits, and 1536 bits, respectively. From Table 6, the communication cost is higher than that of the AKA schemes in [28,32,33] and significantly lower than that of the AKA schemes in [25,27,31]. However, references [28,32,33] only realized two-party communication between the drone and the GS. Although our communication overhead is not the lowest, in a UAV emergency rescue relay network scenario, the communication throughput of a 5G link can reach at least 100 Mbps. The communication bandwidth required by our protocol is approximately 2.3 Kbps, which is far lower than the available bandwidth, thus fully meeting the real-time authentication requirements in actual emergency rescue scenarios.

8.4. Storage Cost

According to Table 7, in the key agreement phase, the storage cost of our scheme is higher than that of the AKA schemes in references [25,32,33], but lower than that of the AKA schemes in references [27,28,31]. Although our storage overhead is not the lowest, in the UAV relay network scenario, the storage capacity of eVTOLs, UAVs, and the ground control center can typically reach several gigabytes or even higher. The storage space required by our protocol is only about a few thousand bits, which is far lower than the available storage of typical onboard equipment, thus fully meeting the key agreement and authentication requirements in actual emergency rescue scenarios.

8.5. End-to-End Delay

In our proposed drone-assisted authentication scenario, the delay mainly stems from cryptographic operations and the number of transmission hops among the eVTOL, relay drone, and dispatch center. Since our protocol avoids high-overhead operations (such as bilinear pairings or modular exponentiations) and relies only on lightweight symmetric encryption, hash operations, and ECC scalar multiplication, the total computation time is less than 27 ms. Moreover, in a 5G communication environment, the total end-to-end delay is less than 30 ms, which is acceptable for pre-rescue mission authentication.
Setting of the tolerance threshold ( Δ T ): Based on our experimental measurements of the end-to-end delay along the eVTOL-to-drone-to-DC relay path (the average computation time for one authentication is approximately 27 ms), and considering that the end-to-end delay is at most 30 ms in a 5G communication environment, we set the timestamp freshness threshold to ΔT = 0.5 s, providing a sufficient margin for worst-case delays.

8.6. Energy Cost

eVTOLs and drones have limited energy, so energy consumption needs to be conserved during the authentication process. Based on our measurements on a Raspberry Pi 4B platform (quad-core 64-bit ARM Cortex-A72, 1.5 GHz, 2 GB LPDDR4 SDRAM), computing one SHA-256 hash, one AES-128 encryption, and one ECC scalar multiplication requires approximately 0.25 µJ, 8.6 µJ, and 80 mJ, respectively. Table 8 presents a comparison of the energy consumption of our scheme and other related protocols during the authentication process. Among them, ref. [33] has the highest energy consumption at 1120.00275 mJ, followed by the schemes in [25,27,28,31,32] and at 830.05   m J , 804.5172 mJ, 800.00225 mJ, 960.013 mJ and 800.0278 mJ, respectively. The energy consumption of our scheme is 720.05635 mJ, meaning that our protocol is the most energy-efficient. Furthermore, the energy consumption of the protocol is far less than the 100–300 joules required for a micro-drone to fly for one second, or the 160,000 joules required for a manned-grade eVTOL (e.g., Alia CX300) to fly for one second. Therefore, the energy consumption of the proposed protocol does not have a substantial impact on flight endurance.
From the perspective of balancing computational cost, communication cost, storage cost, energy overhead, security, and practical applicability, although our scheme does not achieve the lowest computational, communication, or storage overhead compared with all other schemes, our protocol achieves security while still meeting the requirements of emergency rescue after the eVTOL has moved beyond the DC coverage area.

9. Conclusions

The rapid rise in the low-altitude economy, driven by autonomous aerial vehicles and eVTOLs, has spawned a wide range of applications in emergency rescue. Because unmanned manned-capable eVTOLs can not only bypass traffic congestion or disruptions to quickly reach accident sites in emergency rescue scenarios, but also conduct reconnaissance, deliver supplies, and rapidly transport injured persons, they play a vital role in emergency rescue. In view of practical challenges such as signal interruption and limited coverage of dispatch centers, this paper designs a drone-assisted authentication and key agreement protocol between an unmanned manned-capable eVTOL and the dispatch center. The proposed protocol overcomes several limitations found in existing protocols: the lack of consideration of relay node failure in drone-to-drone communication protocols, the inability to achieve perfect forward secrecy of session keys in existing drone-assisted emergency communication protocols, as well as vulnerabilities to device capture attacks, impersonation attacks, and privacy leakage. Formal security proofs and informal security analysis demonstrate that the proposed protocol is secure. Meanwhile, our simulation conducted on a Raspberry Pi 4B experimental environment shows that the execution time of our protocol is 26.748 ms, achieving higher computational efficiency compared to related schemes.
It should be noted that the proposed scheme still has certain limitations. The protocol is a theoretical solution for drone-assisted unmanned manned-capable eVTOL authentication in emergency rescue scenarios and has not yet been experimentally validated on real drones, unmanned manned-capable eVTOLs, and dispatch centers. Computational overhead simulations were conducted on a Raspberry Pi 4B platform. Although this platform is relatively close to actual drones, it does not account for additional delays that may arise from power constraints and real-time task preemption. Moreover, the adopted PUF only considers its security, without taking into account issues such as its cost and environmental robustness. Therefore, deploying and testing the proposed protocol in real-world application scenarios constitutes the primary direction of our future work. On the other hand, given that eVTOLs play a significant role in the low-altitude economy, including air passenger transport and aerial logistics, we will propose appropriate schemes tailored to these scenarios accordingly.

Author Contributions

Q.X., writing—review and editing, resources, supervision, funding acquisition; H.C., writing—original draft. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the Hangzhou Joint Fund of the Zhejiang Provincial Natural Science Foundation of China (Grant No. LHZSZ24F020002) and the National Natural Science Foundation of China (Grant No. U21A20466).

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Nilsbakken, I.M.W.; Cuevas-Østrem, M.; Wisborg, T.; Sollid, S.; Jeppesen, E. Effect of urban vs. remote settings on prehospital time and mortality in trauma patients in Norway: A national population-based study. Scand. J. Trauma Resusc. Emerg. Med. 2023, 31, 53. [Google Scholar] [CrossRef]
  2. Goyal, R.; Cohen, A. Advanced air mobility: Opportunities and challenges deploying eVTOLs for air ambulance service. Appl. Sci. 2022, 12, 1183. [Google Scholar] [CrossRef]
  3. Saeed, N.; Al-Naffouri, T.Y.; Alouini, M.S. Wireless communication for flying cars. Front. Commun. Netw. 2021, 2, 689881. [Google Scholar] [CrossRef]
  4. Sarwatt, D.S.; Lin, Y.; Ding, J.; Sun, Y.; Ning, H. Metaverse for intelligent transportation systems (ITS): A comprehensive review of technologies, applications, implications, challenges and future directions. IEEE Trans. Intell. Transp. Syst. 2024, 25, 6290–6308. [Google Scholar] [CrossRef]
  5. Hooper, M.; Tian, Y.; Zhou, R.; Cao, B.; Lauf, A.P.; Watkins, L.; Alexis, W. Securing commercial wifi-based UAVs from commonsecurity attacks. In Proceedings of the MILCOM 2016–2016 IEEE Military Communications Conference IEEE, Baltimore, MD, USA, 1–3 November 2016; pp. 1213–1218. [Google Scholar] [CrossRef]
  6. Blazy, O.; Bonnefoi, P.F.; Conchon, E.; Sauveron, D.; Akram, R.N.; Markantonakis, K.; Mayes, K.; Chaumette, S. An Efficient Protocol for UAS Security. In Proceedings of the 2017 Integrated Communications, Navigation and Surveillance Conference (ICNS), Herndon, VA, USA, 18–20 April 2017; pp. 1–21. [Google Scholar] [CrossRef]
  7. Cheon, J.H.; Han, K.; Hong, S.M.; Kim, H.J.; Kim, J.; Kim, S.; Seo, H.; Shim, H.; Song, Y. Toward a secure drone system: Flying with real-time homomorphic authenticated encryption. IEEE Access 2018, 6, 24325–24339. [Google Scholar] [CrossRef]
  8. Srinivas, J.; Das, A.K.; Kumar, N.; Rodrigues, J.J.P.C. TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment. IEEE Trans. Veh. Technol. 2019, 68, 6903–6916. [Google Scholar] [CrossRef]
  9. Gope, P.; Sikdar, B. An efficient privacy-preserving authenticated key agreement scheme for edge-assisted internet of drones. IEEE Trans. Veh. Technol. 2020, 69, 13621–13630. [Google Scholar] [CrossRef]
  10. Zhang, Y.; He, D.; Li, L.; Chen, B. A lightweight authentication and key agreement scheme for Internet of Drones. Comput. Commun. 2020, 154, 455–464. [Google Scholar] [CrossRef]
  11. Alladi, T.; Venkatesh, V.; Chamola, V.; Chaturvedi, N. Drone-MAP: A Novel Authentication Scheme for Drone-Assisted 5G Networks. In Proceedings of the IEEE INFOCOM 2021—IEEE Conference on Computer Communications Workshops (INFOCOMWKSHPS), Vancouver, BC, Canada, 10–13 May 2021; pp. 1–6. [Google Scholar] [CrossRef]
  12. Wu, T.; Guo, X.; Chen, Y.; Kumari, S.; Chen, C. Amassing the security: An enhanced authentication protocol for drone communications over 5G networks. Drones 2021, 6, 10. [Google Scholar] [CrossRef]
  13. Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Karimipour, H.; Srivastava, G.; Aledhari, M. Enabling drones in the internet of things with decentralized blockchain-based security. IEEE Internet Things J. 2020, 8, 6406–6415. [Google Scholar] [CrossRef]
  14. Feng, C.; Liu, B.; Guo, Z.; Yu, K.; Qin, Z.; Choo, K.K.R. Blockchain-based cross-domain authentication for intelligent 5G-enabled internet of drones. IEEE Internet Things J. 2021, 9, 6224–6238. [Google Scholar] [CrossRef]
  15. Khan, M.A.; Ullah, I.; Alkhalifah, A.; Rehman, S.U.; Shah, J.A.; Uddin, M.I.; Alsharif, M.H.; Algarni, F. A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems. IEEE Trans. Ind. Inform. 2021, 18, 3416–3425. [Google Scholar] [CrossRef]
  16. Xiao, Y.; Tao, Y. SLAKA-IoD: A secure and lightweight authentication and key agreement protocol for Internet of Drones. Drones 2024, 8, 374. [Google Scholar] [CrossRef]
  17. Masuduzzaman, M.; Islam, A.; Sadia, K.; Shin, S.Y. UAV-based MEC-assisted automated traffic management scheme using blockchain. Future Gener. Comput. Syst. 2022, 134, 256–270. [Google Scholar] [CrossRef]
  18. Yu, S.; Das, A.K.; Park, Y.; Lorenz, P. SLAP-IoD: Secure and lightweight authentication protocol using physical unclonable functions for internet of drones in smart city environments. IEEE Trans. Veh. Technol. 2022, 71, 10374–10388. [Google Scholar] [CrossRef]
  19. Lounis, K.; Ding, S.H.; Zulkernine, M. D2D-MAP: A drone to drone authentication protocol using physical unclonable functions. IEEE Trans. Veh. Technol. 2022, 72, 5079–5093. [Google Scholar] [CrossRef]
  20. Karmakar, R.; Kaddoum, G.; Akhrif, O. A PUF and fuzzy extractor-based UAV-ground station and UAV-UAV authentication mechanism with intelligent adaptation of secure sessions. IEEE Trans. Mob. Comput. 2023, 23, 3858–3875. [Google Scholar] [CrossRef]
  21. Pu, C.; Choo, K.K.R.; Korać, D. A lightweight and anonymous application-aware authentication and key agreement protocol for the internet of drones. IEEE Internet Things J. 2024, 11, 19790–19803. [Google Scholar] [CrossRef]
  22. Guo, J.; Chang, L.; Song, Y.; Yao, S.; Zheng, Z.; Hao, Y.; Zhao, M. AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks. Comput. Stand. Interfaces 2025, 91, 103870. [Google Scholar] [CrossRef]
  23. Guo, J.; Yao, S.; Song, Y.; Han, X.; Zheng, Z.; Chang, L. N3PA-STIN: A Novel Three-Party Authentication Protocol for Multiuser Access in Satellite Terrestrial Integrated Networks. IEEE Internet Things J. 2025, 12, 14952–14968. [Google Scholar] [CrossRef]
  24. Xie, Q.; Ding, Z.; Zheng, P. Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 2023, 24, 7318–7327. [Google Scholar] [CrossRef]
  25. Xie, Q.; Wang, J. PUF-based lightweight authentication protocol for vehicle-to-grid communication with three-factor secrecy. Alex. Eng. J. 2026, 139, 19–30. [Google Scholar] [CrossRef]
  26. El-Zawawy, M.A.; Brighente, A.; Conti, M. Authenticating drone-assisted internet of vehicles using elliptic curve cryptography and blockchain. IEEE Trans. Netw. Serv. Manag. 2022, 20, 1775–1789. [Google Scholar] [CrossRef]
  27. Miao, J.; Wang, Z.; Ning, X.; Shankar, A.; Maple, C.; Rodrigues, J.J. A UAV-assisted authentication protocol for internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2024, 25, 10286–10297. [Google Scholar] [CrossRef]
  28. Nyangaresi, V.O.; Ahmad, M.; Maghrabi, L.A.; Althaqafi, T. Cost-effective PUF and ECC based authentication protocol for secure internet of drones communication. IEEE Internet Things J. 2025, 12, 33844–33857. [Google Scholar] [CrossRef]
  29. Wu, F.; Li, X.; Luo, X.; Gu, K. A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance. J. Syst. Archit. 2022, 132, 102737. [Google Scholar] [CrossRef]
  30. Liu, Y.; Xia, Q.; Li, X.; Gao, J.; Zhang, X. An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity. J. Syst. Archit. 2023, 142, 102935. [Google Scholar] [CrossRef]
  31. Wang, D.; Cao, Y.; Lam, K.Y.; Hu, Y.; Kaiwartya, O. Authentication and key agreement based on three factors and PUF for UAVs-assisted postdisaster emergency communication. IEEE Internet Things J. 2024, 11, 20457–20472. [Google Scholar] [CrossRef]
  32. Xie, Q.; Wang, H. PUF-based secure and efficient anonymous authentication protocol for UAV towards cross-domain environments. Drones 2025, 9, 260. [Google Scholar] [CrossRef]
  33. Wang, F.; Hai, H.; Cui, J.; Wen, W.; Zhang, Q.; Zhong, H. A Secure Anonymous Authentication and Key Agreement Scheme for UAV Swarms in Emergency Rescue Environments. In Proceedings of the 2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS), Hefei, China, 14–18 December 2025; pp. 1–10. [Google Scholar] [CrossRef]
  34. Ying, S.; Li, X.; Xie, Q. Secure and efficient V2ES authentication protocol and faster-RCNN based object detection scheme for connected autonomous vehicles. Veh. Commun. 2026, 58, 100997. [Google Scholar] [CrossRef]
  35. Li, S.; Cao, J.; Xiong, Y.; Liu, K.; Ma, R.; Zhang, Y.; Niu, B.; Yin, P.; Li, H. Efficient Vehicle Secure Scheduling and Access Authentication Scheme for 5G-Integrated Emergency Rescue Scenario. IEEE Trans. Intell. Transp. Syst. 2025, 26, 21004–21023. [Google Scholar] [CrossRef]
  36. Xie, Q.; Huang, J.; Yu, Y. Provably Secure Authentication Protocol for Emergency Vehicles Avoidance in VANETs. IEEE Internet Things J. 2026. [Google Scholar] [CrossRef]
  37. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 2003, 29, 198–208. [Google Scholar] [CrossRef]
  38. Maiti, A.; Kim, I.; Schaumont, P. A robust physical unclonable function with enhanced challenge-response set. IEEE Trans. Inf. Forensics Secur. 2011, 7, 333–345. [Google Scholar] [CrossRef]
Figure 1. System architecture of the proposed approach.
Figure 1. System architecture of the proposed approach.
Drones 10 00391 g001
Figure 2. Unmanned eVTOL registration process.
Figure 2. Unmanned eVTOL registration process.
Drones 10 00391 g002
Figure 3. Drone registration process.
Figure 3. Drone registration process.
Drones 10 00391 g003
Figure 4. Framework of the proposed AKA process.
Figure 4. Framework of the proposed AKA process.
Drones 10 00391 g004
Figure 5. The AKA process of the unmanned eVTOL–relay drone–DC of our protocol.
Figure 5. The AKA process of the unmanned eVTOL–relay drone–DC of our protocol.
Drones 10 00391 g005
Figure 6. Definitions.
Figure 6. Definitions.
Drones 10 00391 g006
Figure 7. Events and queries.
Figure 7. Events and queries.
Drones 10 00391 g007
Figure 8. Process of unmanned eVTOL.
Figure 8. Process of unmanned eVTOL.
Drones 10 00391 g008
Figure 9. Process of the drone.
Figure 9. Process of the drone.
Drones 10 00391 g009
Figure 10. Process of the DC.
Figure 10. Process of the DC.
Drones 10 00391 g010
Figure 11. Main process.
Figure 11. Main process.
Drones 10 00391 g011
Figure 12. Results of security verification.
Figure 12. Results of security verification.
Drones 10 00391 g012
Table 1. Summary of related schemes from the past five years.
Table 1. Summary of related schemes from the past five years.
SchemeYearCryptographic TechniquesAdvantagesLimits
[9]2020Utilizes PUFProvides a key agreement mechanism that ensures privacy in edge-assisted IoDAssumes edge nodes trustworthy
[10]2020Utilizes one-way
hash function
Provides mutual authentication for user and droneDoes not resist physical
capture attack
[11]2021Utilizes one-way
hash function
Provides resistance to tracking through identity updatesDoes not resist internal attacks
[12]2021Utilizes fuzzy ex-tractorProvides mutual authentication for user and droneDoes not resist physical
capture attack
[13]2020Utilizes blockchainProvides distributed
mutual authentication
Does not resist physical
capture attack
[14]2021Utilizes PUFProvides cross-domain mutual authenticationHigh computational overhead
[15]2021Utilizes hyperelliptic curve cryptographyProvides privacy for UAV-enabled ITSDoes not resist impersonation attacks
[16]2024Utilizes one-way
hash function
Provides lightweight computationDoes not resist GS capture attack
[17]2022Utilizes blockchainProvides decentralized traffic management by storing authentication logsCannot provide active authentication; limited scenario applicability
[18]2022Utilizes ECCProvides mutual authentication among UAVs and base station devices.Does not resist physical
capture attack
[19]2022Utilizes PUFProvides direct UAV-to-UAV authenticationDoes not achieve anonymity
[20]2023Utilizes PUF + fuzzy extractorProvides mutual authentication between UAV and ground stationRisk of permanent identity leakage
[21]2024Utilizes PUFProvides application-aware anonymous authenticationStill relies on centralized components
[22]2025Utilizes one-way
hash function
Provides support batch verification for satellite–terrestrial networksPrimarily addresses satellite access, not directly for UAVs
[23]2025Utilizes fuzzy extractorProvides multi-user access for satellite–terrestrial integrated networksPrimarily addresses satellite access, not directly for UAVs
[26]2022Utilizes ECCProvides UAV-assisted V2V authenticationLacks message integrity guarantee
[27]2024Utilizes ECCProvides conditional privacy for UAV-assisted vehicular networksDoes not resist physical
capture attack
[28]2025Utilizes PUF + ECCA novel authentication protocol for the Internet of Drones-
[29]2022Utilizes one-way
hash function
Provides anonymity and identity traceabilityDoes not resist physical
capture attack
[30]2023Utilizes one-way
hash function
Provides anonymity for UAV-assisted VANETDoes not resist physical
capture attack
[31]2024Utilizes PUF + ECCProvides three-factor securityDoes not keep
perfect forward secrecy
[32]2025Utilizes PUFProvides cross-domain anonymous authenticationFocuses on UAV–GS authentication, not UAV–UAV
[33]2025Utilizes Chinese remainder theorem + chameleon hashNo trusted authority required during AKADoes not resist physical
capture attack
[35]2025Utilizes ECCProvides secure scheduling for rescue vehicles with certificateless managementDoes not resist physical
capture attack
Table 2. Notations and Descriptions.
Table 2. Notations and Descriptions.
NotationDescription
K D C Private key of DC
P K D C Public key of DC
P Base point of the elliptic curve
I D e i ,   I D d j ,   I D D C Identities of unmanned eVTOLi, Dronej, DC
P I D e i ,   P I D d j Pseudonymous identity of unmanned eVTOL and Dronej
B e i ,   B d j Secret parameter of unmanned eVTOL and Dronej
P U F ( ) Physical unclonable function
( C h a j ,   R e s j ) PUF’ challenges and responses
h ( ) Hash function
T i Timestamps
Δ T The maximum transmission delay time
S K e i d j ,   S K e i D C ,   S K D C d j Session key
E ( ) ,   D ( ) Symmetric encryption/decryption algorithm
Table 3. Comparison of security properties.
Table 3. Comparison of security properties.
Attacks/Properties[25][27][28][31][32][33]Ours
Verification Table Theft Attacks
Replay Attack
Physical Capture Attack
Forgery Attacks
Impersonation Attack
Know Session Key Attack
Perfect Forward Secrecy
Session Key Secrecy
MITM Attack
Anonymity and Unlinkability
Insider Attack-
Mutual Authentication
Desynchronization Attack
Note. ✓: resist attacks/provide properties; ✕: suffer attacks/not provide properties; -: Not considered.
Table 4. Computation cost.
Table 4. Computation cost.
OperationDescriptionExecution Time
T h One-way hash function0.009 ms
T ecm Elliptical curve scalar multiplication2.610 ms
T eca Elliptical curve addition0.012 ms
T P U F Physical unclonable function0.009 ms
T enc / dec Symmetric encryption/decryption0.51 ms
Table 5. Comparison of computation cost.
Table 5. Comparison of computation cost.
SchemeComputation CostTime (ms)
[25] 10 T e c m + 1 T P U F + 16 T h + 3 T e n c / d e c 27.783 ms
[27] 10 T e c m + T e c a + 18 T h + 2 T e n c / d e c 27.294 ms
[28] 9 T h + 1 T P U F + 10 T e c m 26.19 ms
[31] 52 T h + 12 T e c m + 3 T P U F 33.318 ms
[32] 8 T h + 2 T P U F + 10 T e c m + 3 T e n c / d e c 27.72 ms
[33] 14 T e c m + 11 T h 36.639 ms
Ours 19 T h + 3 T P U F + 9 T e c m + 6 T e n c / d e c 26.748 ms
Table 6. Comparison of communication cost.
Table 6. Comparison of communication cost.
SchemeNo. of MessagesBits
[25]42336
[27]43088
[28]32128
[31]42976
[32]2752
[33]31536
Ours42320
Table 7. Comparison of storage cost.
Table 7. Comparison of storage cost.
SchemeTotal (Bits)
[25]1280
[27]2080
[28]2048
[31]3072
[32]1168
[33]1440
Ours1824
Table 8. Comparison of energy cost.
Table 8. Comparison of energy cost.
SchemeCost (mJ)
[25] 830.05   m J
[27] 804.5172 m J
[28] 800.00225 mJ
[31] 960.013 mJ
[32] 800.0278 m J
[33] 1120.00275 mJ
Ours 720.05635 mJ
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xie, Q.; Chen, H. Drone-Assisted Lightweight Authentication Protocol for Unmanned eVTOL Emergency Rescue. Drones 2026, 10, 391. https://doi.org/10.3390/drones10050391

AMA Style

Xie Q, Chen H. Drone-Assisted Lightweight Authentication Protocol for Unmanned eVTOL Emergency Rescue. Drones. 2026; 10(5):391. https://doi.org/10.3390/drones10050391

Chicago/Turabian Style

Xie, Qi, and Huai Chen. 2026. "Drone-Assisted Lightweight Authentication Protocol for Unmanned eVTOL Emergency Rescue" Drones 10, no. 5: 391. https://doi.org/10.3390/drones10050391

APA Style

Xie, Q., & Chen, H. (2026). Drone-Assisted Lightweight Authentication Protocol for Unmanned eVTOL Emergency Rescue. Drones, 10(5), 391. https://doi.org/10.3390/drones10050391

Article Metrics

Back to TopTop