IoT-Enabled UAV Networks for Secure Communication

A special issue of Drones (ISSN 2504-446X). This special issue belongs to the section "Drone Communications".

Deadline for manuscript submissions: 6 November 2025 | Viewed by 2336

Special Issue Editors


E-Mail Website
Guest Editor
College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China
Interests: computer science and technology; cyberspace security; UAV

E-Mail Website
Guest Editor
College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics (NUAA), Nanjing 211106, China
Interests: edge/fog computing; industrial IoT; vehicular/UAV systems; 5G and beyond communication networks
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China
Interests: machine learning and its applications in net-work and unmanned systems; autonomous driving network
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
College of Communications Engineering, Army Engineering University of PLA, Nanjing 210007, China
Interests: machine learning and resource management in IoT; wireless com-munication; game theory

E-Mail Website
Guest Editor
School of Computer Science, University of Technology Sydney, Sydney, Australia
Interests: computer science and technology; cyberspace security

Special Issue Information

Dear Colleagues,

The rapid advancement of Internet of Things (IoT) technologies has revolutionized numerous industries, including the field of unmanned aerial vehicles (UAVs), commonly known as drones. UAVs have become essential in a wide range of applications, such as surveillance, delivery systems, environmental monitoring, and search and rescue operations. By integrating IoT technologies into UAVs, a network of interconnected systems is created, allowing UAVs to communicate with other devices, sensors, and control systems in real time, thereby enhancing their operational capabilities. This IoT-enabled UAV network is proving to be transformative, particularly in terms of improving efficiency, scalability, and automation. However, as the reliance on IoT-enabled UAVs increases, significant challenges related to security and privacy emerge. UAVs operate in open, dynamic environments, often covering long distances and navigating through congested airspaces, making them susceptible to various cybersecurity threats, such as data interception, unauthorized access, and malicious attacks. Therefore, secure communication within IoT-enabled UAV networks is crucial in maintaining the integrity and confidentiality of data exchanges, ensuring safe operations, and preventing malicious activities that could disrupt services or cause damage. Research in secure communication for IoT-enabled UAV networks is essential, as these systems must not only transmit data efficiently but also be resilient against cyber threats. Key areas of focus include the development of robust encryption techniques, secure routing protocols, and real-time monitoring systems that guarantee secure communication links between UAVs, ground stations, and other IoT devices. Additionally, research is underway investigating advanced authentication methods, intrusion detection, and trust models to safeguard data integrity and privacy. The significance of this research lies in its ability to enable safe, reliable, and scalable IoT-enabled UAV networks. As UAVs become more integrated into critical infrastructure, transportation, and emergency services, ensuring secure communication becomes paramount. By addressing security concerns, this field contributes to the broader goal of achieving a fully connected, efficient, and secure IoT ecosystem that supports the growing demands of industries and enhances the quality of service delivery across various sectors.

This Special Issue will highlight new developments and methodologies, best practices, and applications in IoT-enabled UAV networks for secure communication. We welcome submissions that offer the community the most recent advancements on all aspects of reliable and secure communication and service applications of UAV networks.

For this Special Issue, we welcome manuscripts that link the following themes:

  • Secure communication protocols for UAV networks;
  • Distributed Intrusion Detection and Prevention Systems (IDPSs);
  • Privacy protection in IoT-enabled UAV networks;
  • Blockchain for secure UAV communication;
  • Resilient UAV communication networks;
  • Real-time security management for UAV operations;
  • Artificial intelligence and machine learning for UAV network security.

We look forward to receiving your original research articles and reviews.

Prof. Dr. Bing Chen
Prof. Dr. Changyan Yi
Prof. Dr. Kun Zhu
Dr. Yutao Jiao
Dr. Zhiyi Tian
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Drones is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things (IoT)
  • unmanned aerial vehicle (UAV)
  • flying ad hoc networks (FANET)
  • drones
  • ground control station (GCS)

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

24 pages, 1530 KiB  
Article
A Lightweight Robust Training Method for Defending Model Poisoning Attacks in Federated Learning Assisted UAV Networks
by Lucheng Chen, Weiwei Zhai, Xiangfeng Bu, Ming Sun and Chenglin Zhu
Drones 2025, 9(8), 528; https://doi.org/10.3390/drones9080528 - 28 Jul 2025
Viewed by 469
Abstract
The integration of unmanned aerial vehicles (UAVs) into next-generation wireless networks greatly enhances the flexibility and efficiency of communication and distributed computation for ground mobile devices. Federated learning (FL) provides a privacy-preserving paradigm for device collaboration but remains highly vulnerable to poisoning attacks [...] Read more.
The integration of unmanned aerial vehicles (UAVs) into next-generation wireless networks greatly enhances the flexibility and efficiency of communication and distributed computation for ground mobile devices. Federated learning (FL) provides a privacy-preserving paradigm for device collaboration but remains highly vulnerable to poisoning attacks and is further challenged by the resource constraints and heterogeneous data common to UAV-assisted systems. Existing robust aggregation and anomaly detection methods often degrade in efficiency and reliability under these realistic adversarial and non-IID settings. To bridge these gaps, we propose FedULite, a lightweight and robust federated learning framework specifically designed for UAV-assisted environments. FedULite features unsupervised local representation learning optimized for unlabeled, non-IID data. Moreover, FedULite leverages a robust, adaptive server-side aggregation strategy that uses cosine similarity-based update filtering and dimension-wise adaptive learning rates to neutralize sophisticated data and model poisoning attacks. Extensive experiments across diverse datasets and adversarial scenarios demonstrate that FedULite reduces the attack success rate (ASR) from over 90% in undefended scenarios to below 5%, while maintaining the main task accuracy loss within 2%. Moreover, it introduces negligible computational overhead compared to standard FedAvg, with approximately 7% additional training time. Full article
(This article belongs to the Special Issue IoT-Enabled UAV Networks for Secure Communication)
Show Figures

Figure 1

25 pages, 2195 KiB  
Article
Performance Analysis of Blockchain Consensus Algorithm in Unmanned Aerial Vehicle Ad Hoc Networks
by Xuan Huang and Dongyan Huang
Drones 2025, 9(5), 334; https://doi.org/10.3390/drones9050334 - 25 Apr 2025
Viewed by 1244
Abstract
Blockchain technology is a competitive solution to address the prevailing data security concerns in unmanned aerial vehicle (UAV) networks. However, wireless communication links between UAV nodes are vulnerable to electromagnetic interference and competition due to limited spectrum resources. Consequently, a comprehensive analysis of [...] Read more.
Blockchain technology is a competitive solution to address the prevailing data security concerns in unmanned aerial vehicle (UAV) networks. However, wireless communication links between UAV nodes are vulnerable to electromagnetic interference and competition due to limited spectrum resources. Consequently, a comprehensive analysis of blockchain performance within UAV network environments is imperative for the effective deployment and optimization of blockchain technology. This paper presents two theoretical models. The first model assesses the impact of the Carrier Sense Multiple Access with Collision Avoid (CSMA/CA) channel access protocol on the latency and throughput of the chained HotStuff consensus algorithm. The second model considers the movement characteristics of UAV nodes in three-dimensional space and the complexity of the communication environment. The aim of the second model is to calculate the consensus failure probability of UAV networks under electromagnetic interference. The results demonstrate that the theoretical values closely match the actual simulation outcomes. Full article
(This article belongs to the Special Issue IoT-Enabled UAV Networks for Secure Communication)
Show Figures

Figure 1

Back to TopTop