Drone-Assisted Lightweight Authentication Protocol for Unmanned eVTOL Emergency Rescue
Highlights
- In this study, we design an authentication architecture for unmanned eVTOL emergency rescue using drones as communication relays.
- Our lightweight and high-security design leverages PUFs embedded in drones, unmanned eVTOLs, and the dispatching center.
- Our protocol enables the safe and efficient execution of rescue missions, even in complex urban environments, and ensures continuity and reliability for actual emergency rescue operations, even under extreme conditions such as 5G signal dead zones.
Abstract
1. Introduction
- Novel Drone-Assisted Authentication Architecture for Unmanned eVTOL Emergency Rescue: We propose an authentication protocol specifically designed for unmanned eVTOL emergency rescue scenarios to address the issue of direct communication unavailability with the dispatching center. The protocol enables secure three-party authentication among the unmanned eVTOL, relay drone, and dispatching center, with all messages transmitted via the relay node throughout the authentication process, ensuring that rescue operations can be securely conducted even in complex urban environments.
- Practical Design for Urban Emergency Rescue Scenarios: Unlike existing schemes that assume continuous infrastructure coverage, our protocol fully considers the communication constraints commonly encountered in real-world rescue environments, such as signal blockage caused by urban high-rise buildings and dead zones. The relay-assisted mechanism ensures that authentication and key agreement can still be completed under extreme conditions, including 5G signal dead zones, directly supporting the continuity and reliability requirements of actual emergency rescue missions.
- PUF-Based Lightweight Security Design: By leveraging PUFs embedded in each unmanned eVTOL, drone, and DC, our protocol achieves lightweight authentication without requiring complex cryptographic operations. The PUFs’ challenge–response mechanism provides inherent resistance against physical tampering and enables efficient key generation suitable for resource-constrained aerial platforms.
- Strong Security and High Computational Efficiency: This proposed scheme provides mutual authentication and session key negotiation while withstanding common threats including MITM, replay, and impersonation attacks, while also achieving anonymity and untraceability for unmanned eVTOL identities during relay communications. Compared with some related schemes, our protocol delivers strong security with reduced costs in computation, communication, and storage.
2. Related Work
3. System and Adversary Models
3.1. System Model
3.2. Adversary Model
- The adversary can listen to public channel transmissions, as well as tamper with, replay, or inject messages.
- If an adversary can hijack the unmanned eVTOL and drone, they can analyze the stored information.
- An adversary could compromise/capture the unmanned eVTOL and drone.
- The adversary may compromise/capture the dispatching center (DC).
- Only when examining perfect forward secrecy can adversaries be allowed to know the long-term private keys of users and servers.
4. Preliminary
4.1. Physically Unclonable Function
4.2. One-Way Hash Function
- 1.
- Fixed Output Length: No matter what finite length the input has, the hash value produced by always possesses the same predetermined length.
- 2.
- Preimage Resistance (One-Way Property): For a given hash result h, discovering any input m satisfying is computationally impossible. Hence, the function cannot be inverted.
- 3.
- Collision Resistance: Finding any pair of distinct inputs and (where ) such that .
- 4.
- Second Preimage Resistance: It is practically infeasible for a specified , to discover a second distinct (where ) such that .
- 5.
- Pseudo-Randomness (Puzzle-Friendliness): The output of a hash function behaves like a random oracle, meaning there is no efficient method to predict or control the output value by strategically selecting the input.
5. Proposed Protocol
5.1. Initialization Phase
5.2. Registration Phase
- Unmanned eVTOL Registration phase
- Step ER1: The unmanned eVTOLi (I = 1, 2, 3… t) sends identity to the DC with a secure channel.
- Step ER2: Upon reception of the , the DC generates timestamp and computes the following:
- Step ER3: Upon reception of the message , the unmanned eVTOLi generates challenge value and computes the following:
- 2.
- Drone Registration phase
- Step DR1: Dronej (j = 1, 2, 3… k) sends identity to the DC with a secure channel.
- Step DR2: Upon reception of the , the DC generates timestamp and computes the following:
5.3. Authentication and Key Agreement Phase
- Step AK1: The unmanned eVTOLi computesthen generates random number and timestamp . It then computes
- Step AK2: Upon receiving the message , Dronej first generates timestamp and checks whether holds; if it holds, Dronej computesthen generates random number and computes
- Step AK3: Upon receiving the message , the DC first generates timestamp and checks whether holds; if it holds, it generates random number and computes
- Step AK4: On receiving the message , Dronej first generates timestamp and checks whether holds; if it holds, it computes .
- Step AK5: Upon receiving the message the unmanned eVTOLi first generates timestamp and checks whether holds; if it holds, it computes
6. Formal Security Proof
6.1. Definition of Random Oracle Model
- (1)
- Both participants are in the state.
- (2)
- .
- (3)
- and .
- Execute Query (): When this query is executed, can obtain all publicly transmitted parameters.
- Send Query (): sends a message m to . If m is legitimate and correct, responds to the message; otherwise, it is ignored.
- Reveal Query (): If the test query has not been executed and the session keys and have been negotiated, can obtain the session key by executing this query.
- Corrupt Query (): The user’s mobile device stores parameters ; can obtain these parameters by executing this query.
- Test Query (): This query first creates a random bit r. When a session key has been generated and r = 1, A receives the real session key; when r = 0, A receives a random number. If no session key exists, an empty string is returned. The query is limited to a single execution.
- (1)
- The reveal query is never made, and the corrupt query is made at most once.
- (2)
- The states of both and are Accept.
6.2. Formal Proof
6.3. Formal Security Verification Using ProVerif
7. Informal Security Analysis
- Verification Table Theft Attack
- 2.
- Replay Attack
- 3.
- Physical Capture Attack
- 4.
- Impersonation Attacks
- 5.
- Forgery Attacks
- 6.
- Know Session Key Attack
- 7.
- Perfect Forward Secrecy
- 8.
- Session Key Secrecy
- 9.
- Man-in-the-Middle (MITM) Attack
- 10.
- Desynchronization Attack
- 11.
- Anonymity and Unlinkability
- 12.
- Insider Attack
- 13.
- Mutual Authentication
8. Performance Evaluation
8.1. Security Comparison
8.2. Computational Cost
8.3. Communication Cost
8.4. Storage Cost
8.5. End-to-End Delay
8.6. Energy Cost
9. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Nilsbakken, I.M.W.; Cuevas-Østrem, M.; Wisborg, T.; Sollid, S.; Jeppesen, E. Effect of urban vs. remote settings on prehospital time and mortality in trauma patients in Norway: A national population-based study. Scand. J. Trauma Resusc. Emerg. Med. 2023, 31, 53. [Google Scholar] [CrossRef]
- Goyal, R.; Cohen, A. Advanced air mobility: Opportunities and challenges deploying eVTOLs for air ambulance service. Appl. Sci. 2022, 12, 1183. [Google Scholar] [CrossRef]
- Saeed, N.; Al-Naffouri, T.Y.; Alouini, M.S. Wireless communication for flying cars. Front. Commun. Netw. 2021, 2, 689881. [Google Scholar] [CrossRef]
- Sarwatt, D.S.; Lin, Y.; Ding, J.; Sun, Y.; Ning, H. Metaverse for intelligent transportation systems (ITS): A comprehensive review of technologies, applications, implications, challenges and future directions. IEEE Trans. Intell. Transp. Syst. 2024, 25, 6290–6308. [Google Scholar] [CrossRef]
- Hooper, M.; Tian, Y.; Zhou, R.; Cao, B.; Lauf, A.P.; Watkins, L.; Alexis, W. Securing commercial wifi-based UAVs from commonsecurity attacks. In Proceedings of the MILCOM 2016–2016 IEEE Military Communications Conference IEEE, Baltimore, MD, USA, 1–3 November 2016; pp. 1213–1218. [Google Scholar] [CrossRef]
- Blazy, O.; Bonnefoi, P.F.; Conchon, E.; Sauveron, D.; Akram, R.N.; Markantonakis, K.; Mayes, K.; Chaumette, S. An Efficient Protocol for UAS Security. In Proceedings of the 2017 Integrated Communications, Navigation and Surveillance Conference (ICNS), Herndon, VA, USA, 18–20 April 2017; pp. 1–21. [Google Scholar] [CrossRef]
- Cheon, J.H.; Han, K.; Hong, S.M.; Kim, H.J.; Kim, J.; Kim, S.; Seo, H.; Shim, H.; Song, Y. Toward a secure drone system: Flying with real-time homomorphic authenticated encryption. IEEE Access 2018, 6, 24325–24339. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Kumar, N.; Rodrigues, J.J.P.C. TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment. IEEE Trans. Veh. Technol. 2019, 68, 6903–6916. [Google Scholar] [CrossRef]
- Gope, P.; Sikdar, B. An efficient privacy-preserving authenticated key agreement scheme for edge-assisted internet of drones. IEEE Trans. Veh. Technol. 2020, 69, 13621–13630. [Google Scholar] [CrossRef]
- Zhang, Y.; He, D.; Li, L.; Chen, B. A lightweight authentication and key agreement scheme for Internet of Drones. Comput. Commun. 2020, 154, 455–464. [Google Scholar] [CrossRef]
- Alladi, T.; Venkatesh, V.; Chamola, V.; Chaturvedi, N. Drone-MAP: A Novel Authentication Scheme for Drone-Assisted 5G Networks. In Proceedings of the IEEE INFOCOM 2021—IEEE Conference on Computer Communications Workshops (INFOCOMWKSHPS), Vancouver, BC, Canada, 10–13 May 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Wu, T.; Guo, X.; Chen, Y.; Kumari, S.; Chen, C. Amassing the security: An enhanced authentication protocol for drone communications over 5G networks. Drones 2021, 6, 10. [Google Scholar] [CrossRef]
- Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Karimipour, H.; Srivastava, G.; Aledhari, M. Enabling drones in the internet of things with decentralized blockchain-based security. IEEE Internet Things J. 2020, 8, 6406–6415. [Google Scholar] [CrossRef]
- Feng, C.; Liu, B.; Guo, Z.; Yu, K.; Qin, Z.; Choo, K.K.R. Blockchain-based cross-domain authentication for intelligent 5G-enabled internet of drones. IEEE Internet Things J. 2021, 9, 6224–6238. [Google Scholar] [CrossRef]
- Khan, M.A.; Ullah, I.; Alkhalifah, A.; Rehman, S.U.; Shah, J.A.; Uddin, M.I.; Alsharif, M.H.; Algarni, F. A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems. IEEE Trans. Ind. Inform. 2021, 18, 3416–3425. [Google Scholar] [CrossRef]
- Xiao, Y.; Tao, Y. SLAKA-IoD: A secure and lightweight authentication and key agreement protocol for Internet of Drones. Drones 2024, 8, 374. [Google Scholar] [CrossRef]
- Masuduzzaman, M.; Islam, A.; Sadia, K.; Shin, S.Y. UAV-based MEC-assisted automated traffic management scheme using blockchain. Future Gener. Comput. Syst. 2022, 134, 256–270. [Google Scholar] [CrossRef]
- Yu, S.; Das, A.K.; Park, Y.; Lorenz, P. SLAP-IoD: Secure and lightweight authentication protocol using physical unclonable functions for internet of drones in smart city environments. IEEE Trans. Veh. Technol. 2022, 71, 10374–10388. [Google Scholar] [CrossRef]
- Lounis, K.; Ding, S.H.; Zulkernine, M. D2D-MAP: A drone to drone authentication protocol using physical unclonable functions. IEEE Trans. Veh. Technol. 2022, 72, 5079–5093. [Google Scholar] [CrossRef]
- Karmakar, R.; Kaddoum, G.; Akhrif, O. A PUF and fuzzy extractor-based UAV-ground station and UAV-UAV authentication mechanism with intelligent adaptation of secure sessions. IEEE Trans. Mob. Comput. 2023, 23, 3858–3875. [Google Scholar] [CrossRef]
- Pu, C.; Choo, K.K.R.; Korać, D. A lightweight and anonymous application-aware authentication and key agreement protocol for the internet of drones. IEEE Internet Things J. 2024, 11, 19790–19803. [Google Scholar] [CrossRef]
- Guo, J.; Chang, L.; Song, Y.; Yao, S.; Zheng, Z.; Hao, Y.; Zhao, M. AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks. Comput. Stand. Interfaces 2025, 91, 103870. [Google Scholar] [CrossRef]
- Guo, J.; Yao, S.; Song, Y.; Han, X.; Zheng, Z.; Chang, L. N3PA-STIN: A Novel Three-Party Authentication Protocol for Multiuser Access in Satellite Terrestrial Integrated Networks. IEEE Internet Things J. 2025, 12, 14952–14968. [Google Scholar] [CrossRef]
- Xie, Q.; Ding, Z.; Zheng, P. Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 2023, 24, 7318–7327. [Google Scholar] [CrossRef]
- Xie, Q.; Wang, J. PUF-based lightweight authentication protocol for vehicle-to-grid communication with three-factor secrecy. Alex. Eng. J. 2026, 139, 19–30. [Google Scholar] [CrossRef]
- El-Zawawy, M.A.; Brighente, A.; Conti, M. Authenticating drone-assisted internet of vehicles using elliptic curve cryptography and blockchain. IEEE Trans. Netw. Serv. Manag. 2022, 20, 1775–1789. [Google Scholar] [CrossRef]
- Miao, J.; Wang, Z.; Ning, X.; Shankar, A.; Maple, C.; Rodrigues, J.J. A UAV-assisted authentication protocol for internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2024, 25, 10286–10297. [Google Scholar] [CrossRef]
- Nyangaresi, V.O.; Ahmad, M.; Maghrabi, L.A.; Althaqafi, T. Cost-effective PUF and ECC based authentication protocol for secure internet of drones communication. IEEE Internet Things J. 2025, 12, 33844–33857. [Google Scholar] [CrossRef]
- Wu, F.; Li, X.; Luo, X.; Gu, K. A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance. J. Syst. Archit. 2022, 132, 102737. [Google Scholar] [CrossRef]
- Liu, Y.; Xia, Q.; Li, X.; Gao, J.; Zhang, X. An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity. J. Syst. Archit. 2023, 142, 102935. [Google Scholar] [CrossRef]
- Wang, D.; Cao, Y.; Lam, K.Y.; Hu, Y.; Kaiwartya, O. Authentication and key agreement based on three factors and PUF for UAVs-assisted postdisaster emergency communication. IEEE Internet Things J. 2024, 11, 20457–20472. [Google Scholar] [CrossRef]
- Xie, Q.; Wang, H. PUF-based secure and efficient anonymous authentication protocol for UAV towards cross-domain environments. Drones 2025, 9, 260. [Google Scholar] [CrossRef]
- Wang, F.; Hai, H.; Cui, J.; Wen, W.; Zhang, Q.; Zhong, H. A Secure Anonymous Authentication and Key Agreement Scheme for UAV Swarms in Emergency Rescue Environments. In Proceedings of the 2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS), Hefei, China, 14–18 December 2025; pp. 1–10. [Google Scholar] [CrossRef]
- Ying, S.; Li, X.; Xie, Q. Secure and efficient V2ES authentication protocol and faster-RCNN based object detection scheme for connected autonomous vehicles. Veh. Commun. 2026, 58, 100997. [Google Scholar] [CrossRef]
- Li, S.; Cao, J.; Xiong, Y.; Liu, K.; Ma, R.; Zhang, Y.; Niu, B.; Yin, P.; Li, H. Efficient Vehicle Secure Scheduling and Access Authentication Scheme for 5G-Integrated Emergency Rescue Scenario. IEEE Trans. Intell. Transp. Syst. 2025, 26, 21004–21023. [Google Scholar] [CrossRef]
- Xie, Q.; Huang, J.; Yu, Y. Provably Secure Authentication Protocol for Emergency Vehicles Avoidance in VANETs. IEEE Internet Things J. 2026. [Google Scholar] [CrossRef]
- Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 2003, 29, 198–208. [Google Scholar] [CrossRef]
- Maiti, A.; Kim, I.; Schaumont, P. A robust physical unclonable function with enhanced challenge-response set. IEEE Trans. Inf. Forensics Secur. 2011, 7, 333–345. [Google Scholar] [CrossRef]












| Scheme | Year | Cryptographic Techniques | Advantages | Limits |
|---|---|---|---|---|
| [9] | 2020 | Utilizes PUF | Provides a key agreement mechanism that ensures privacy in edge-assisted IoD | Assumes edge nodes trustworthy |
| [10] | 2020 | Utilizes one-way hash function | Provides mutual authentication for user and drone | Does not resist physical capture attack |
| [11] | 2021 | Utilizes one-way hash function | Provides resistance to tracking through identity updates | Does not resist internal attacks |
| [12] | 2021 | Utilizes fuzzy ex-tractor | Provides mutual authentication for user and drone | Does not resist physical capture attack |
| [13] | 2020 | Utilizes blockchain | Provides distributed mutual authentication | Does not resist physical capture attack |
| [14] | 2021 | Utilizes PUF | Provides cross-domain mutual authentication | High computational overhead |
| [15] | 2021 | Utilizes hyperelliptic curve cryptography | Provides privacy for UAV-enabled ITS | Does not resist impersonation attacks |
| [16] | 2024 | Utilizes one-way hash function | Provides lightweight computation | Does not resist GS capture attack |
| [17] | 2022 | Utilizes blockchain | Provides decentralized traffic management by storing authentication logs | Cannot provide active authentication; limited scenario applicability |
| [18] | 2022 | Utilizes ECC | Provides mutual authentication among UAVs and base station devices. | Does not resist physical capture attack |
| [19] | 2022 | Utilizes PUF | Provides direct UAV-to-UAV authentication | Does not achieve anonymity |
| [20] | 2023 | Utilizes PUF + fuzzy extractor | Provides mutual authentication between UAV and ground station | Risk of permanent identity leakage |
| [21] | 2024 | Utilizes PUF | Provides application-aware anonymous authentication | Still relies on centralized components |
| [22] | 2025 | Utilizes one-way hash function | Provides support batch verification for satellite–terrestrial networks | Primarily addresses satellite access, not directly for UAVs |
| [23] | 2025 | Utilizes fuzzy extractor | Provides multi-user access for satellite–terrestrial integrated networks | Primarily addresses satellite access, not directly for UAVs |
| [26] | 2022 | Utilizes ECC | Provides UAV-assisted V2V authentication | Lacks message integrity guarantee |
| [27] | 2024 | Utilizes ECC | Provides conditional privacy for UAV-assisted vehicular networks | Does not resist physical capture attack |
| [28] | 2025 | Utilizes PUF + ECC | A novel authentication protocol for the Internet of Drones | - |
| [29] | 2022 | Utilizes one-way hash function | Provides anonymity and identity traceability | Does not resist physical capture attack |
| [30] | 2023 | Utilizes one-way hash function | Provides anonymity for UAV-assisted VANET | Does not resist physical capture attack |
| [31] | 2024 | Utilizes PUF + ECC | Provides three-factor security | Does not keep perfect forward secrecy |
| [32] | 2025 | Utilizes PUF | Provides cross-domain anonymous authentication | Focuses on UAV–GS authentication, not UAV–UAV |
| [33] | 2025 | Utilizes Chinese remainder theorem + chameleon hash | No trusted authority required during AKA | Does not resist physical capture attack |
| [35] | 2025 | Utilizes ECC | Provides secure scheduling for rescue vehicles with certificateless management | Does not resist physical capture attack |
| Notation | Description |
|---|---|
| Private key of DC | |
| Public key of DC | |
| Base point of the elliptic curve | |
| Identities of unmanned eVTOLi, Dronej, DC | |
| Pseudonymous identity of unmanned eVTOL and Dronej | |
| Secret parameter of unmanned eVTOL and Dronej | |
| Physical unclonable function | |
| PUF’ challenges and responses | |
| Hash function | |
| Timestamps | |
| The maximum transmission delay time | |
| Session key | |
| Symmetric encryption/decryption algorithm |
| Attacks/Properties | [25] | [27] | [28] | [31] | [32] | [33] | Ours |
|---|---|---|---|---|---|---|---|
| Verification Table Theft Attacks | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Replay Attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Physical Capture Attack | ✕ | ✕ | ✓ | ✓ | ✓ | ✕ | ✓ |
| Forgery Attacks | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Impersonation Attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Know Session Key Attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Perfect Forward Secrecy | ✓ | ✓ | ✓ | ✕ | ✓ | ✓ | ✓ |
| Session Key Secrecy | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| MITM Attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Anonymity and Unlinkability | ✓ | ✓ | ✕ | ✓ | ✓ | ✓ | ✓ |
| Insider Attack | ✓ | ✓ | ✓ | ✓ | ✓ | - | ✓ |
| Mutual Authentication | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Desynchronization Attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Operation | Description | Execution Time |
|---|---|---|
| One-way hash function | 0.009 ms | |
| Elliptical curve scalar multiplication | 2.610 ms | |
| Elliptical curve addition | 0.012 ms | |
| Physical unclonable function | 0.009 ms | |
| Symmetric encryption/decryption | 0.51 ms |
| Scheme | Computation Cost | Time (ms) |
|---|---|---|
| [25] | 27.783 | |
| [27] | 27.294 | |
| [28] | 26.19 | |
| [31] | 33.318 | |
| [32] | 27.72 | |
| [33] | 36.639 | |
| Ours | 26.748 |
| Scheme | No. of Messages | Bits |
|---|---|---|
| [25] | 4 | 2336 |
| [27] | 4 | 3088 |
| [28] | 3 | 2128 |
| [31] | 4 | 2976 |
| [32] | 2 | 752 |
| [33] | 3 | 1536 |
| Ours | 4 | 2320 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Xie, Q.; Chen, H. Drone-Assisted Lightweight Authentication Protocol for Unmanned eVTOL Emergency Rescue. Drones 2026, 10, 391. https://doi.org/10.3390/drones10050391
Xie Q, Chen H. Drone-Assisted Lightweight Authentication Protocol for Unmanned eVTOL Emergency Rescue. Drones. 2026; 10(5):391. https://doi.org/10.3390/drones10050391
Chicago/Turabian StyleXie, Qi, and Huai Chen. 2026. "Drone-Assisted Lightweight Authentication Protocol for Unmanned eVTOL Emergency Rescue" Drones 10, no. 5: 391. https://doi.org/10.3390/drones10050391
APA StyleXie, Q., & Chen, H. (2026). Drone-Assisted Lightweight Authentication Protocol for Unmanned eVTOL Emergency Rescue. Drones, 10(5), 391. https://doi.org/10.3390/drones10050391

