An Opportunistic Key Exchange Scheme for Location Information Sharing on UAV Networks Resilient to MiM Attacks

  • Agnaldo Batista UFPR
  • Vinícius Trindade UFMG
  • Aldri Santos UFPR / UFMG

Resumo


As unmanned aerial vehicles (UAVs) demand wireless technologies for their communication, they become prone to serious security threats that aim to compromise the integrity and confidentiality of the exchanged control data, standing out man-in-the-middle (MiM) attacks as one of the most damaging. Besides, UAV networks require essential critical services for their regular operation, like the UAV location service. Key exchange is one way to protect UAV communications against MiM attacks. This paper proposes KEYSUAV, a key exchange scheme to enable a resilient location information sharing on UAV networks against MiM attacks. KEYSUAV relies on opportunistic approaches and on the lightweight cryptographic standard ASCON, an algorithm designed for resource-constrained devices like UAVs. Simulation results show that KEYSUAV over the FlySafe system detected 100% of compromised messages sent by a MiM attacker with a slight reduction in UAVs’ spatial awareness, around 4.5%, thus fostering the resilience of the location service for UAV networks.

Referências

Administration, F. A. (2021). Operation of Small Unmanned Aircraft Systems Over People. [link]. (accessed 8 august 2023).

Al-Shareeda, M. A. and Manickam, S. (2022). Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation. Symmetry, 14(8):1543.

Alladi, T., Bansal, G., Chamola, V., Guizani, M., et al. (2020). SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication. IEEE Transactions on Vehicular Technology, 69(12):15068–15077. DOI: 10.1109/TVT.2020.3033060.

Anagnostis, I., Kotzanikolaou, P., and Douligeris, C. (2025). Understanding and securing the risks of uncrewed aerial vehicle services. IEEE Access, 13:47955–47995.

Batista, A. D. S. and Dos Santos, A. L. (2024). A survey on resilience in information sharing on networks: Taxonomy and applied techniques. ACM Computing Surveys, 56(12):1–36.

Batista, A. S. and Santos, A. L. (2025). Resilient UAVs location sharing service based on information freshness and opportunistic deliveries. Pervasive and Mobile Computing, 111:102066. DOI: 10.1016/j.pmcj.2025.102066.

Chen, X., Hu, C., Xia, H., Hu, P., and Yu, J. (2026). Lightweight and Efficient Authentication Scheme for Secure Intra/Inter-Domain Communications in the Internet of Drones. IEEE Transactions on Network Science and Engineering, 13:3810–3827.

Cilardo, A., Coppolino, L., Mazzocca, N., and Romano, L. (2006). Elliptic curve cryptography engineering. Proceedings of the IEEE, 94(2):395–406.

Dobraunig, C., Eichlseder, M., Mendel, F., and Schläffer, M. (2021). ASCON v1.2 - Submission to NIST. [link]. (Access: Jan 2026).

Dogan, H. (2023). Protecting UAV-networks: a secure lightweight authentication and key agreement scheme. In 7th International Conference on Cryptography, Security and Privacy, CSP, pages 13–21, New Jersey, USA. IEEE. DOI: 10.1109/CSP58884.2023.00010.

Farooq, J. and Zhu, Q. (2025). Cyber Resilience in Next-Generation Networks: Threat Landscape, Theoretical Foundations, and Design Paradigms. arXiv preprint arXiv:2512.22721.

Grand View Research, I. (2025). Americas UAV Market (2025 - 2033). [link]. (acesso em 22 dezembro 2025).

Kumar, N., Nehal, A., Singh, A. V., Kandpal, K., and Goswami, M. (2025). Efficient, reliable, and secure PUF architecture with temperature invariance and ML attack resilience. Integration, 106:102538. DOI: 10.1016/j.vlsi.2025.102538.

Maatouk, A., Kriouile, S., Assaad, M., and Ephremides, A. (2020). The Age of Incorrect Information: A New Performance Metric for Status Updates. IEEE/ACM Transactions on Networking, 28(5):2215–2228. DOI: 10.1109/TNET.2020.3005549.

Mehrabi, M. A., Doche, C., and Jolfaei, A. (2020). Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module. Transactions on Computers, 69(11):1707–1718.

NS-3, C. (2025). NS-3 Discrete-event Network Simulator. [link]. (accessed 10 december 2025).

Patel, A. and Cherukuri, A. K. (2025). Analysis of light-weight cryptography algorithms for uav-networks. arXiv preprint arXiv:2504.04063.

Turan, M. S., McKay, K. A., Chang, D., Kang, J., and Kelsey, J. (2025). Ascon-Based Lightweight Cryptography Standards for Constrained Devices. NIST SP 800, 232:1–41.

Xia, T., Wang, M., He, J., Lin, S., Shi, Y., and Guo, L. (2023). Research on Identity Authentication Scheme for UAV Communication Network. Electronics, 12(13):2917. DOI: 10.3390/electronics12132917.

Yates, R. D., Sun, Y., Brown, D. R., Kaul, S. K., Modiano, E., and Ulukus, S. (2021). Age of Information: An Introduction and Survey. Journal on Selected Areas in Communications, 39(5):1183–1210. DOI: 10.1109/JSAC.2021.3065072.

Zhang, Y., Meng, L., Gan, J., and Huang, Z. (2023). A Novel and Efficient Authentication Scheme Based on UAV-UAV Environment. Wireless Communications and Mobile Computing, 2023(1):7107015. DOI: 10.1155/2023/7107015.
Publicado
25/05/2026
BATISTA, Agnaldo; TRINDADE, Vinícius; SANTOS, Aldri. An Opportunistic Key Exchange Scheme for Location Information Sharing on UAV Networks Resilient to MiM Attacks. In: SIMPÓSIO BRASILEIRO DE REDES DE COMPUTADORES E SISTEMAS DISTRIBUÍDOS (SBRC), 44. , 2026, Praia do Forte/BA. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2026 . p. 141-154. ISSN 2177-9384. DOI: https://doi.org/10.5753/sbrc.2026.19890.

Artigos mais lidos do(s) mesmo(s) autor(es)