A certificateless identity authentication scheme for UAVs via blockchain sharding

Zhi-Peng Zhong , Xiao Chen , Mu-Hong Huang , Hao-Zhe Wang , Sheng Cao , Xiao-Song Zhang

Journal of Electronic Science and Technology ›› 2026, Vol. 24 ›› Issue (1) : 100346

PDF (3666KB)
Journal of Electronic Science and Technology ›› 2026, Vol. 24 ›› Issue (1) :100346 DOI: 10.1016/j.jnlest.2026.100346
research-article
A certificateless identity authentication scheme for UAVs via blockchain sharding
Author information +
History +
PDF (3666KB)

Abstract

With the growing deployment of unmanned aerial vehicles (UAVs) swarms in national defense, military operations, and emergency response, secure and reliable intra-swarm identity authentication has become critical for ensuring coordinated action and mission reliability. To address the drawbacks of public key infrastructure (PKI) based authentication in UAV swarms, namely, complex certificate management, strong dependence on centralized authorities, and authentication latency, we propose a certificateless identity authentication scheme for UAV swarms built on blockchain sharding. The scheme leverages sharding to execute authentication in parallel across multiple shards, significantly improving efficiency. Each UAV locally generates its public/private key pair and then adopts a registration-based encryption (RBE) mechanism: A registration algorithm binds the device identity to its key on the blockchain, ensuring public verifiability and immutability of identity mapping. On this basis, an authentication algorithm runs in which the initiator produces an authentication signature using a common reference string (CRS), on-chain public-key registration information, and its local private key, and the verifier rapidly validates the authentication message using the on-chain registration data and the identity of the initiator. The experimental results demonstrate that the proposed scheme achieves low-latency and high-throughput identity authentication in large-scale UAV swarm environments, providing a solid technical foundation and broad application prospects for trustworthy UAV swarm identity authentication.

Keywords

Blockchain / Certificateless / Identity authentication / Registration-based encryption / UAV swarms

Cite this article

Download citation ▾
Zhi-Peng Zhong, Xiao Chen, Mu-Hong Huang, Hao-Zhe Wang, Sheng Cao, Xiao-Song Zhang. A certificateless identity authentication scheme for UAVs via blockchain sharding. Journal of Electronic Science and Technology, 2026, 24(1): 100346 DOI:10.1016/j.jnlest.2026.100346

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Zhi-Peng Zhong: Conceptualization, Methodology, Validation, Writing−original draft, Reviewers comments respond. Xiao Chen: Fabrication, Testing and measurement, Writing−original draft. Mu-Hong Huang: Fabrication, Testing and measurement. Hao-Zhe Wang: Data curation, Overall review. Sheng Cao: Writing−review and editing, Overall review. Xiao-Song Zhang: Overall review.

Declaration of competing interest

Xiao-Song Zhang and Sheng Cao are a special section committee members for Journal of Electronic Science and Technology and were not involved in the editorial review or the decision to publish this article. Other authors declare that there are no competing interests.

Acknowledgements

This work was supported by the National Natural Science Foundation of China under Grant No.62472075 and the Innovation Theory and Technology Group Fund of the Southwest China Institute of Electronic Technology under Grant No.2024jsq0207.

References

[1]

L.-Q. Chen, Y.-Q. Zhu, S.-H. Liu, H.-T. Yu, B. Zhang, PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication, Comput. Commun. 218 (2024) 31-43.

[2]

P.-B. Han, A.-N. Sui, J. Wu, Lightweight secure communication supporting batch authentication for UAV swarm, Drones 9 (2) (2025) 139.

[3]

J.-X. Wang, J.-J. Wang, X. Zhang, H.-H. Du, C.-X. Jiang, A time-varying graph-based dynamic blockchain sharding scheme for large-scale drone networks, IEEE Internet Things (August 2025),[Online]. Available,https://ieeexplore.ieee.org/document/11136119.

[4]

L.-L. Zhang, A cross network identity authentication scheme for UAVs based on layered blockchain technology, in: Proc. of the 16th Intl. Conf. on Intelligent Networking and Collaborative Systems, Asan, Korea, 2024, pp. 131-141.

[5]

C.-Z. Dong, A.-T. Yao, Z.-Y. Xu, M.-Q. Lu, F. Jiang, S.-P. Chen, et al., A blockchain-based self-sovereign identity system for KYC processes, in: Proc. of the 6th ACM Intl. Symp. on Blockchain and Secure Critical Infrastructure, Singapore, Singapore, 2024, pp. 1-11.

[6]

C.-Z. Dong, F. Jiang, X.-J. Li, A.-T. Yao, G. Li, X. Liu, A blockchain-aided self-sovereign identity framework for edge-based UAV delivery system, in: Proc. of the IEEE/ACM 21st Intl. Symp. on Cluster, Cloud and Internet Computing (Ccgrid), Melbourne, Australia, 2021, pp. 622-624.

[7]

C.-J. Jiang, Y. Fang, P.-H. Zhao, J. Panneerselvam, Intelligent UAV identity authentication and safety supervision based on behavior modeling and prediction, IEEE T. Ind. Inform. 16 (10) (2020) 6652-6662.

[8]

T. Alladi, Naren , G. Bansal, V. Chamola, M. Guizani, SecAuthUAV: a novel authentication scheme for UAV-ground station and UAV-UAV communication, IEEE T. Veh. Technol. 69 (12) (2020) 15068-15077.

[9]

C.-Z. Dong, Z.-Y. Wang, S.-P. Chen, Y. Xiang, BBM: a blockchain-based model for open banking via self-sovereign identity, in: Proc. of the 3rd Intl., Conf. on Blockchain, Honolulu, USA, 2020, pp. 61-75.

[10]

Z. Chen, X. Chen, Y. Li, Performance and security analysis of distributed ledger under the internet of things environments with network instability, IEEE Internet Things 10 (5) (2022) 4213-4225.

[11]

L. Luu, V. Narayanan, C.-D. Zheng, K. Baweja, S. Gilbert, P. Saxena, A secure sharding protocol for open blockchains, in: Proc. of the ACM SIGSAC Conf. on Computer and Communications Security, Vienna, Austria, 2016, pp. 17-30.

[12]

X. Chen, M.-H. Huang, Y.-F. Tian, Y. Wang, S. Cao, X. Zhang, Internet of vehicles data sharing scheme via blockchain sharding, J. Comput. Res. Dev. 61 (9) (2024) 2246-2260.

[13]

Y.-Z. Liu, D.-Y. Li, J.-W. Liu, Sharding blockchain application in cross-domain authentication management system, Y.-Z. Liu, D.-Y. Li, J.-W. Liu (Eds.), Sharding Blockchain: Fundamentals and Applications, Springer, Singapore, Singapore, 2025, pp. 297-326.

[14]

N. Glaeser, D. Kolonelos, G. Malavolta, A. Rahimi, Efficient registration-based encryption, in: Proc. of the ACM SIGSAC Conf. on Computer and Communications Security, Copenhagen, Denmark, 2023, pp. 1065-1079.

[15]

S. Garg, M. Hajiabadi, M. Mahmoody, A. Rahimi, Registration-based encryption: removing private-key generator from IBE, in: Proc. of the 16th Intl. Conf. on Theory of Cryptography, Panaji, India, 2018, pp. 689-718.

[16]

H. Zhang, F. Zhao, Cross-domain identity authentication scheme based on blockchain and PKI system, High-Confid, Comput. Times 3 (1) (2023) 100096.

[17]

P. Jadhav, M. Misbahuddin, S.S. Chippalkatti, S.D. Sudarsan, PKI-enabled authentication and encryption for enhanced drone communication, in: Proc. of the IEEE Intl. Conf. on Public Key Infrastructure and its Applications (PKIA), Bangalore, India, 2024, pp. 1-10.

[18]

Z.-X. Cai, Y. Wang, Q. Jiang, G. Gui, J. Sha, Toward intelligent lightweight and efficient UAV identification with RF fingerprinting, IEEE Internet Things 11 (15) (2024) 26329-26339.

[19]

S.S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, in: Proc. of the 9th Intl. Conf. on the Theory and Application of Cryptology and Information Security on Advances in Cryptology, Taipei, China, 2003, pp. 452-473.

[20]

W.-J. Ao, S.-J. Fu, C. Zhang, M. Xu, A secure certificateless identity authentication scheme based on blockchain, in: Proc. of the 13th Chinese Conf. on Trusted Computing and Information Security, Shanghai, China, 2019, pp. 251-266.

[21]

C. Wang, T. Zhou, M.-D. Ma, Y.W. Xiong, X.K. Zhang, C. Liu, An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks, J. Netw. Comput. Appl. 232 (2024) 104007.

[22]

L. Zhang, X.-T. Yang, Y.-B. Zheng, T.-Y. Yu, A.-Q. Yang, N. Han, EACAS: an efficient anonymous cross-domain authentication scheme in internet of vehicles, IEEE Internet Things 12 (7) (2025) 7749-7762.

[23]

Z.-B. Li, X.-T. Liu, N. Zhang, Z.-Z. Wei, Blockchain-based certificateless cross-domain authentication scheme in the industrial internet of things, CMC-Comput. Mater. Con. 80 (3) (2024) 3835-3854.

[24]

J.-B. Jiao, B. Chen, F. Hu, Y.-K. Wu, A lightweight and dynamic authentication scheme based on blockchain and aSVC for UAV swarm, Drones 9 (9) (2025) 654.

[25]

M.-Y. Xie, Z. Chang, A.R. Ndjiongue, H.W. Li, BAZAM: a blockchain-assisted zero-trust authentication in multi-UAV wireless networks, IEEE Internet Things (August 2025),[Online]. Available,http://www.halcyon.com/pub/journals/21ps03-vidmar.

PDF (3666KB)

12

Accesses

0

Citation

Detail

Sections
Recommended

/