Your new experience awaits. Try the new design now and help us make it even better

ORIGINAL RESEARCH article

Front. Phys., 02 February 2026

Sec. Social Physics

Volume 14 - 2026 | https://doi.org/10.3389/fphy.2026.1698126

An efficient group key agreement scheme for UAV swarms

Zhe WangZhe WangJing LiJing LiShengzhi YuanShengzhi YuanYinuo Zhang
Yinuo Zhang*
  • School of Weapon Engineering, Naval University of Engineering, Wuhan, Hubei, China

Unmanned Aerial Vehicle (UAV) group communication plays a crucial role in collaborative UAV operations, yet its security faces numerous challenges. Authentication and key agreement protocols, as core technologies for securing UAV communications, have significant research value. In the context of UAV group communication, this paper introduces a dynamic authentication and group key negotiation protocol leveraging elliptic curve signature techniques. By incorporating group key agreement techniques, the proposed protocol offloads complex key computation tasks to the cluster controller, thereby effectively alleviating the problem of limited UAV computational resources and significantly improving overall system efficiency. The proposed protocol supports dynamic joining and leaving of UAV groups, ensuring essential security properties such as backward secrecy and forward secrecy, thus guaranteeing the security and adaptability of group communication. Based on the random oracle model, this paper employs formal security proofs to verify the protocol’s security and further demonstrates through informal security analysis that it can effectively resist both active and passive attacks. Performance evaluation results show that the proposed protocol outperforms existing schemes in terms of computational and communication overhead, achieving both efficiency and security, making it suitable for resource-constrained UAV group communication environments with broad application prospects.

Highlights

• An efficient dynamic group key negotiation protocol is developed to support secure authentication and key updates for UAV group communications.

• Under the random oracle model, the security of the protocol is validated through formal proofs, while informal analysis further confirms its ability to resist both active and passive attacks.

• Performance evaluation results indicate that the proposed protocol achieves reduced computational and communication overhead.

1 Introduction

In recent years, the rapid advancement of Unmanned Aerial Vehicle (UAV) technology has positioned UAV swarms not merely as efficient machines, but as critical components of Cyber-Physical Social Systems (CPSS). By enabling multiple autonomous agents to engage in collective action and distributed decision-making (e.g., coordinated data collection), UAV swarms offer superior efficiency and robustness. This dynamic, interacting collective forms an essential, autonomous layer for applications central to Sociophysics and network science, such as Smart City infrastructure monitoring, large-scale crowd behavior analysis, and rapid disaster response—all of which rely heavily on secure, timely data. Nevertheless, in real-world deployments, UAV swarms unavoidably encounter significant challenges regarding secure communications, especially concerning the security of group communications [1]. Given the highly dynamic nature of UAV swarm communication, the large-scale number of nodes, and the frequent changes in communication links, conventional group key agreement schemes are often unsuitable for such complex environments. Consequently, the design of efficient, secure, and dependable group key agreement protocols tailored for UAV swarm communications has emerged as a pressing research challenge that must be addressed [2].

In UAV swarm communications, current group authentication and key agreement protocols remain subject to notable shortcomings and constraints. For instance, certificate-based public key authentication entails frequent certificate updates and revocations, incurring significant communication and storage costs, and is thus poorly suited to UAV swarm networks with resource constraints and highly dynamic topologies. Identity-based public key authentication schemes, while avoiding certificates and streamlining both authentication and key management, require frequent bilinear pairing operations that impose a considerable computational load on UAV nodes, necessitating efforts to minimize their use in real deployments. Conversely, relative to conventional pairwise keys, the application of group keys markedly decreases the frequency of encryption and decryption in communication, thereby enhancing the efficiency of information transmission within UAV swarms. Nonetheless, group key negotiation protocols without identity authentication present grave security vulnerabilities: attackers may acquire group keys via forgery, replay, and similar attacks, while malicious insiders within the swarm may interfere with the negotiation process. Therefore, to secure UAV swarm communications, it is imperative to design a group key agreement protocol that incorporates efficient identity authentication mechanisms, thereby effectively countering diverse potential attack vectors [35].

At present, studies on group key agreement in UAV swarm environments primarily emphasize achieving a balance among security, communication overhead, and computational burden. On the one hand, UAV nodes usually rely on lightweight embedded systems with constrained computing and storage resources, rendering them unable to support intensive cryptographic computations. On the other hand, UAV swarm communication links change rapidly, and node topologies frequently fluctuate, necessitating frequent group key updates to prevent data leakage or the spread of compromised keys when nodes are infiltrated. Thus, an efficient group key negotiation protocol should maintain security while reducing computational complexity and communication overhead to suit the resource-constrained UAV nodes and the highly dynamic nature of swarm network topologies. In response to these challenges, this paper introduces an efficient group key negotiation protocol for UAV swarms, designed to reconcile the trade-offs between communication overhead, computational complexity, and security robustness. The proposed scheme accounts for both the dynamic nature and the resource limitations of UAV swarm communications, optimizing existing key negotiation protocols to reduce inter-node message exchanges and computational costs, thereby simplifying the key agreement process. The primary contributions of this work can be summarized as follows:

1. For UAV group communications, this paper employs an elliptic curve signature mechanism to achieve device authentication and message verification. To mitigate the resource limitations of UAVs, the protocol utilizes group key agreement technology to offload complex key negotiation computations to the group controller, thereby reducing the computational burden on UAVs and improving overall operational efficiency.

2. An efficient dynamic group key agreement protocol is designed to support secure authentication and key updates for UAV groups during dynamic joining and leaving processes. By leveraging fast scalar multiplication, the protocol achieves low-latency key updates while ensuring essential properties such as forward and backward secrecy, thereby maintaining the security and adaptability of group communications.

3. Under the Random Oracle Model, the security of the proposed protocol is formally proven, and informal analysis further confirms its ability to resist both active and passive attacks. Performance evaluation results demonstrate that the proposed protocol significantly reduces both computational and communication costs, exhibiting outstanding performance advantages.

1.1 Related works

Given the limited operational range of an individual UAV, real-world applications typically necessitate the concurrent deployment of multiple UAV to enable cooperation. Under these circumstances, group communication among UAV proves to be of vital importance. In light of the significant risk of information leakage when data is transmitted to recipients in public and open settings, the establishment of confidential group keys among group members constitutes the cornerstone for safeguarding the security of group communications. A comparative summary of existing schemes in Table 1.

Table 1
www.frontiersin.org

Table 1. A comparative summary.

Sharma et al. [6] proposed a lightweight member authentication and group key establishment scheme for resource-limited smart environments based on symmetric bivariate polynomials. Leveraging symmetric bivariate polynomials, Hsu et al. [7] introduced a lightweight authentication structure incorporating collaborative arithmetic computation within 5G IoT networks. This framework merges member authentication with cooperative arithmetic operations, thereby guaranteeing efficient computation and communication for all group members. Tian et al. [8] presented a privacy-preserving approach tailored for IoD scenarios, employing online/offline signature schemes. They further suggested an authentication scheme based on mobile edge computing. However, their scheme is computationally heavy as it uses RSA-based digital signature approach. Zhang et al. [9] developed an alternative lightweight authentication and key negotiation protocol for IoD environments, in which authentication relies solely on one-way hash functions and XOR computations. However, UAV is required to store secure credentials within this protocol to prove their identity to other entities. This leads to a potential security risk, since a physical attack on a UAV could expose its stored credentials to adversaries. Current authentication protocols are similarly vulnerable to privacy and security risks stemming from physical attacks on UAV.

Semal et al. [10] introduced a certificateless group authentication and key agreement (CL-GAKA) protocol. The protocol ensures confidentiality, integrity, and authenticity in UAV communications. However, their scheme is unable to resist replay attacks and man-in-the-middle tampering attacks. Furthermore, it supports trusted communication, anonymity, and user privacy protection for communications involving untrusted UAV. However, it lacks the ability to manage dynamic changes in UAV, including join and leave operations. Luo et al. [11] presented a cross-domain certificateless group key agreement protocol that allows group key negotiation among members from different domains with diverse parameters in just a single communication round. While supporting dynamic group operations, the protocol assumes adversaries of limited capability; specifically, an attacker cannot substitute a specific user’s public key without access to the master key. Pan et al. [12] designed a heterogeneous authentication and key negotiation protocol between UAV and ground control stations, incorporating three-factor authentication. This scheme, however, requires extensive bilinear pairing computations, leading to significant computational overhead, and with only two rounds of communication, it likewise lacks explicit mutual authentication. Breaken et al. [13] developed a pairing-free asymmetric group key negotiation scheme, notable for using only a single encryption-decryption key pair. However, because each group member holds a unique decryption key, generating these keys typically results in considerable computational overhead. Kermanshahi et al. [14] developed a lightweight certificateless key agreement scheme that, although still relying on bilinear pairings, significantly improves computational efficiency while maintaining security strength, compared to the scheme proposed by others at the same time [15]. Kumar et al. [16] proposed a certificateless group key agreement architecture based on elliptic curve cryptography (ECC) that eliminates the need for bilinear pairings. This scheme utilizes a ring topology network structure to achieve multi-node collaborative key management, significantly reducing computational complexity and communication overhead while ensuring forward security. Ayad et al. [17] designed a two-round certificateless group key agreement mechanism tailored to the communication needs of UAV swarms. The innovation of their approach lies in decoupling key agreement from identity authentication, which effectively balances security and computational efficiency in an open network environment. Frimpong et al. [18] proposed a group authentication key agreement protocol that employs multi-layer public key operations to enhance session key strength. However, the increase in communication rounds leads to higher interaction overhead. Li et al. [19] proposed an asymmetric group key agreement protocol based on blockchain and attributes. This protocol implements fine-grained access control through attribute-based re-signatures, ensuring the privacy and security of user identity information. Additionally, it leverages blockchain’s tamper-proof and traceable features to ensure that transaction data remains immutable and accountable. Zhang et al. [20] introduced an asymmetric group key agreement protocol that employs anonymous authentication technology to protect user privacy. The protocol evenly distributes the key computation process across nodes, reducing both computational and communication overhead. Moreover, it utilizes blockchain’s traceability and blockchain log technology to implement an accountability mechanism. Naresh et al. [21] designed a blockchain-based dynamic authentication group key agreement protocol, using privacy-preserving smart contracts as group controllers. These controllers generate shared keys for each member and calculate partial group keys, which are sent to the respective members. The members then combine these partial keys with their shared keys to generate the group key, enabling data sharing. Tian et al. [22] proposed a blockchain-based group key agreement protocol that integrates blockchain technology with group key management to achieve a decentralized group key management mechanism. None of the above studies consider concurrent group updates, making them unsuitable for UAV networks with highly dynamic topologies and high-concurrency scenarios.

1.2 Paper organization

The structure of this paper is arranged as follows. Section 2 outlines the foundational concepts relevant to the proposed scheme. Section 3 details the authentication protocol in depth. Sections 4, 5 are dedicated to the security assessment and efficiency analysis of the scheme. The final section concludes the study and highlights potential avenues for future exploration.

2 Preliminaries

This section presents the relevant background of proposed scheme, with detailed explanations provided below.

2.1 System architecture

The system comprises three entities—TA, cluster controller and UAV swarm—with their relationships illustrated in Figure 1. A detailed description of these entities is given below.

Figure 1
Diagram illustrating a secure communication system between a Trusted Authority (TA), Cluster Control, and a UAV Cluster. Arrows indicate registration processes from TA to Cluster Control and the UAV Cluster. The UAVs, arranged in a circle, show group key agreement facilitated by Cluster Control.

Figure 1. System architecture.

Trusted Authority (TA): TA serves as the system’s trust management entity, responsible for the registration and authentication of other entities. It is characterized by strong security and authority, ensuring both the legitimacy of participants and secure communications.

Cluster Controller (Mc): The cluster controller oversees the management of UAV swarms, handling group key distribution and negotiation to ensure secure and reliable intra-swarm communication, while coordinating cluster operations.

UAV Cluster: UAV swarm comprises multiple UAV capable of autonomous or semi-autonomous collaboration, information sharing, and task execution. Within the swarm, UAV employs a shared group key to ensure secure communications, preserving mission coordination and overall security.

2.2 Elliptic curve cryptography

In cryptography, elliptic curves are typically defined over the finite field GFp, where p denotes a prime. Given a,bGFp and x,y GFp2, the elliptic curve employed in this work is defined as [2325]:

y2=x3+ax+bmodp

Elliptic curve must satisfy the discriminant condition:

Δ=164a3+27b20

This work primarily addresses two hard problems: the Elliptic Curve Discrete Logarithm Problem (ECDLP) and the Computational Diffie-Hellman Problem (ECDHP).

1. ECDLP: Given γZ*q,P,QG1 with Q=γP, determine γ when P and Q are known.

2. ECDHP: Given P,aP,bPG1, where a,bZ*q are unknown, compute abPG1.

Both of these elliptic curve-based hard problems serve as the cornerstone for the design and security proof of group key agreement protocols [2428].

2.3 Threat model

The threat model is based on the classic Dolev–Yao assumption: the adversary can eavesdrop on and interfere with all communications over the public channel, attempting to violate the system’s authentication, confidentiality, and integrity.

Adversary A can fully control the public communication channel: A can intercept all communications between Mc and the UAV, modify or delete messages, replay old messages, and inject forged data into the network, enabling man-in-the-middle, replay, or forgery attacks—particularly by disrupting or impersonating parties during UAV join/leave group procedures.

Adversary A may obtain some historical session keys; given several known session keys, A will attempt to infer or recover the current session key via analysis or key-derivation attacks, thereby threatening forward and backward secrecy and possibly enabling impersonation of legitimate entities.

If a UAV is captured while executing a mission, A can employ side-channel attack techniques (e.g., power analysis, electromagnetic emissions, timing analysis) to extract secret parameters or private key material from the UAV’s hardware or memory.

3 Proposed scheme

The proposed scheme primarily comprises the initialization, registration, authentication and group key negotiation phases, as well as UAV joining and leaving phases. Table 2 lists the relevant symbols and their definitions used in this section of the protocol.

Table 2
www.frontiersin.org

Table 2. Symbols used in the proposed scheme.

3.1 Initialization

In this stage, TA must generate the essential parameters required for the later authentication and key agreement phases. The detailed steps are as follows:

1. TA selects an elliptic curve cyclic additive group G, whose generator and order are P and q, respectively.

2. TA selects a uniformly random element sZ*q as its long-term secret key, calculates Ppub=sP as its public key, and defines a hash function H1.

3.2 Registration phase

3.2.1 Cluster controller registration

1. Mc selects its identity IDc and submits IDc to TA for registration.

2. Upon receiving the request, TA computes the authentication key sc=H1IDc,s, calculates the public key Pc=scP, securely transmits {sc, Ppub} to Mc, and publishes Pc.

3. After receiving {sc, Ppub}, Mc stores sc, generates a random private key SKc for group key agreement, computes PKc = SKc P as the corresponding public key, and stores the key pair. Registration of Mc is then completed.

3.2.2 UAV registration

1. UAVi selects an identity IDi, generates a random number ri, computes PIDi1=riP, and sends PIDi1,IDi to TA through a secure channel.

2. TA computes PIDi2=IDiH2sPIDi1,Ppub, forming the anonymous identity PIDi=PIDi1,PIDi2. TA then selects a random secret ai, computes Ui=H3PIDi,Ppub, pki=Ui+aiP, ski=Ui+ais1, and sends (pki,ski) PIDi to UAVi via a secure channel.

3. Upon receiving the message, UAVi stores pki,skiPIDi.

3.3 Authentication phase

During this phase, each UAVi and the cluster controller Mc carry out mutual authentication, followed by group key negotiation. The detailed process is as follows:

1. UAVi generates secret random numbers bi and νi, computes Ki=biP, μi=H4PIDi,Ki,pki,Ppub, Ri=νiμiPpub and gi=ski+νiμi. It then transmits gi, Ri,PIDi,Ki,Ti to Mc.

2. Upon receiving the message, Mc verifies the timestamp T1 and proceeds with authentication verification:

Single verification: check whether giPpub?=pki+Ri.

The correctness verification is as follows:

giPpub=ski+νiμiPpub=skiPpub+νiμiPpub=pki+Ri

Batch verification: After successful verification, Mc computes

Gc=scKi
Vc=H4Gc,Ki,PKc

then returns Vc to UAVi.

3. Upon receiving the message, UAVi calculates Gc=biPc and verifies the validity of Vc.

3.4 UAV group key agreement phase

Mc computes a one-to-one shared key Sji with each UAVi using Equation 1:

Sji=SKcKi=xSji,ySji(1)

Here, Sji=SKcKi denotes the scalar multiplication of the elliptic curve point Sji, and the subsequent expression Sji=xSji,ySji refers only to the coordinate representation of this point.

Next, Mc derives a group key share UKi for each UAVi according to Equation 2:

UKi=t=1,tinxSjtP(2)

Here, t=1,tinxjt denotes the ordinary scalar multiplication over the values xSji, and it is not related to elliptic curve point operations.

Mc ensures message integrity by computing δi=hUKiSji and transmits UKi,δi to UAVi.

Upon receiving UKi,δi, UAVi calculates the pairwise key Sji=biPKc=xKji,yKji with Mc and checks whether δi=hUKiSji holds. If valid, UAVi computes the final group key G using Equation 3:

G=xSji·UKi(3)

As Mc possesses all pairwise shared keys, it derives the final group key using Equation 4:

G=t=1nxSjtP(4)

By substituting (Equation 2) into (Equation 3), we can verify that both sides compute the same group key.

Thus, all UAVi in the group, together with Mc, successfully establish a common group key G.

3.5 UAV joining phase

When a UAVn intends to join the group, it must first undergo the authentication procedure to verify mutual legitimacy with Mc and acquire the corresponding valid public key. UAVn then submits a join request to Mc, which initiates group key updating as follows:

1. UAVn derives the pairwise key Sjn=bnPKc=xSjn,ySjn and submits a join request to Mc.

2. Mc computes the pairwise key with UAVn as Sjn=SKcKn=xSjn,ySjn. It selects a random N1, calculates the group key share for UAVn as USn=N1xGP, where xG denotes the x-coordinate of the elliptic curve point G, and then transmits USn,δn to UAVn.

3. Upon receiving the message, UAVn verifies USn using the pairwise key Pjn and δn. If valid, it computes the new group key according to Equation 5:

NG=xSjnUSn(5)

4. For the existing UAVi, Mc computes a new share US0=N1xKjnP. It selects a random Nsig, computes Ks=NsP, derives rs=Ns1hUS0+xKsSKc, and constructs δ0=xKs,rs, Mc then broadcasts US0,δ0 to all legitimate UAV in the group.

5. Each UAVi verifies the signature: Ps=hUS0rs1P+xKsrs1PKc and checks whether xPsig=xPKsig. If the equality holds, the message is valid, and UAVi computes the new group key according to Equation 6:

NG=xGUS0(6)

6. Since Mc possesses all pairwise shared keys, it directly computes the new group key according to Equation 7:

NG=N1t=1nxSjtP(7)

At this stage, all UAV and Mc within the group successfully derive the same new shared key NG.

3.6 UAV leaving phase

When a UAVl intends to leave the group, it must send a departure request to Mc. Mc then facilitates group key updating to ensure that the departing UAVl cannot compute the new group key.

1. After receiving UAVl’s departure request, Mc chooses a random number N2 and computes for each remaining UAVi a secret value: Li=EKijN2xKji1 along with its hash δi=hLiKij , where EKij represents symmetric encryption using the shared key Kij between Mc and UAVi. Mc then transmits Li,δi to the corresponding UAVi.

2. Upon receipt, UAVi verifies the integrity of Li using Kij. If valid, UAVi decrypts Li with the shared key Kji to derive the updated group session key according to Equation 8:

NG=DEKijLixKGP(8)

3. Meanwhile, Mc computes the new group key directly according to Equation 9:

NG=N2xKji1xKGP(9)

At this point, the group key update for UAV departure is complete, and all legitimate entities have derived the new group key NG.

4 Security analysis

In this section, we conduct a security analysis of the proposed scheme under the Random Oracle Model (ROM) [2433]. Furthermore, additional security properties are examined through semantic evaluation.

4.1 Formal security proof using ROM

4.1.1 Security model and proof

This section builds the security model of the proposed scheme under the random oracle framework. The model involves two entities, UAV and Mc, with additional queries for UAV joining and leaving the group.

Participants: The scheme includes entities UAV and Mc, denoted as Ui and Mj. Their instances are denoted ΠUiu and ΠMjv.

Acceptance State: An instance ΠΛt is said to accept if the received message matches the expected one. Its session identifier is the ordered concatenation of all exchanged messages.

Partnership: Two instances ΠUiu and ΠMjv are partners if they both accept and share the same session identifier.

Attacker: Here, the capabilities of adversary A in the threat model are formalized, and the query abilities of adversary A are as follows:

Execute (ΠUiu, ΠMjv): This query simulates the passive attack of adversary A, representing the adversary’s ability to eavesdrop on the communication channel.

Send (ΠΛt, m): This query simulates the active attack of adversary A, representing the adversary’s ability to tamper with, replay, or modify messages.

Join (ΠΛt): This query simulates the scenario where a legitimate UAV joins the group. Through this query, adversary A can obtain a legitimate UAV, ΠΛt and receive information from Mc used to update the group key after joining the group.

Leave (ΠΛt): This query simulates the scenario where a legitimate UAV leaves the group. Through this query, adversary A can obtain information from Mc used to update the group key after the UAV leaves the group.

Reveal (ΠΛt): This query simulates a known session key attack, where adversary A can gain access to certain session keys.

Corrupt (ΠΛt): This query simulates the specific capabilities of an attacker in an efficient dynamic UAV group authentication and key agreement scheme. Through this query, adversary A can obtain secret registration information.

Test (ΠΛt): The purpose of this query is to test adversary A’s understanding of the session key negotiated by ΠΛt. After executing several of the above queries, adversary A will select a UAV instance to perform the Test query, which works as follows: If the instance has not negotiated a session key, the query returns ⊥. If the instance has negotiated a session key, a coin is flipped. If the coin lands heads, let b = 1, and return the actual session key. If the coin lands tails, let b = 0, and return a random value. The task of adversary A is to distinguish whether the value returned by Test (ΠΛt) is a random number or the session key of ΠΛt.

Freshness: An instance is fresh if neither it nor its partner has been subject to a Reveal query.

Semantic Security: The adversary’s goal is to correctly guess the bit b in the Test query. Define

AdvPA=2 Pr [succ1. If this advantage is negligible, the scheme achieves semantic security.

Theorem 1
www.frontiersin.org

Theorem 1. For scheme P and adversary A within polynomial time t, the advantage satisfies:AdvPA≤qh22l+qs+qe2p+2qLn+2qjAdvECDHPA

4.2 Semantic analysis

• Mutual Authentication: The proposed scheme enables mutual authentication between UAVi and Mc. UAVi generates a signature using its TA-issued key pair pki,ski, which Mc validates to confirm UAVi’s authenticity. Conversely, UAVi authenticates Mc through Vc, demonstrating Mc’s possession of a legitimate private key.

• Anonymity: During communications, UAVi employs a TA-generated anonymous identity PIDi instead of its real identity in authentication and group key agreement, thereby ensuring anonymity.

• Man-in-the-Middle Attack Resistance: Adversaries cannot impersonate UAVi or Mc, as they cannot derive a valid PIDi or authentication keys pki,ski. PIDi is constructed using PIDi1=riP and PIDi2=PIDiH2sPIDi1,Ppub, with s as TA’s secret and ri as random, preventing adversaries from obtaining them. Similarly, Mc’s private key sc=H1IDc,s remains unknown to adversaries. Thus, the scheme resists man-in-the-middle attacks.

• Replay Attack Resistance: The scheme uses timestamps to counter replay attacks. Upon receiving a message, both Mc and UAV validate its freshness, terminating the protocol if the timestamp deviates beyond a threshold. Timestamp integrity is guaranteed since forging requires secret keys not exposed over public channels.

• Key Compromise Attack Resistance: Even if Mc’s long-term key is compromised, prior session keys remain secure. While Mc’s authentication key is derived from the long-term secret, the group key negotiation private key cannot be derived from it. UAV’ private keys for negotiation are randomly generated, further ensuring that past keys remain protected. Thus, the scheme achieves perfect forward secrecy.

• Session-Specific Random Number Leakage Attack Resistance: If random numbers generated during authentication or key agreement are leaked, adversaries still cannot authenticate since they lack access to Mc’s private key sc=H1IDc,s and UAV’ key pairs pki,ski.

• Forward Secrecy: When a UAV departs, Mc selects a random N2 and computes KLi=EKijN2xKjl1 for the remaining UAV. The departing UAV cannot obtain N2, thus cannot compute the new group key, ensuring forward secrecy.

• UAV Impersonation Attack Resistance: Adversaries cannot impersonate UAVi or Mc as they lack valid long-term keys and cannot forge signatures to pass verification (giPpub?=pki+Ri).

• Backward Secrecy: If a new member Mj joins, recovering prior group keys requires solving the ECDLP, which is computationally infeasible. Therefore, the scheme ensures backward secrecy.

5 Performance analysis

5.1 Computation cost

In this section, we compare the computational and communication costs of the proposed protocol with those of other related schemes. According to [34], under a Windows seven operating system with a 2.4 GHz processor and 4 GB of memory, the MIRACL library is used to implement the two aforementioned cryptographic operation schemes, and the execution times of various cryptographic operations are recorded in Table 3.

Table 3
www.frontiersin.org

Table 3. Encryption operation time.

Table 4 presents a detailed comparison of the computational costs across different protocols. The Figure 2 clearly depicts how computational overhead scales with the group size, highlighting the performance differences among protocols. As indicated, the proposed scheme achieves comparatively low computational costs on both devices while maintaining structural simplicity.

Table 4
www.frontiersin.org

Table 4. Computation cost comparison.

Figure 2
Line graph depicting computation overhead in milliseconds on the vertical axis against number on the horizontal axis. Five lines represent different methods: [35], [36], [37], [38], and

Figure 2. The comparisons of computation cost.

On the UAV side, the computational cost is 2n+1Tem+ nTea +2Th. Unlike other schemes that typically require numerous scalar multiplications, additions, and bilinear pairings, the proposed protocol cuts the computation by approximately 60%–70%. For instance, when n = 50, the proposed scheme incurs about 81 ms, compared to 190 ms in the lowest-cost scheme [34], achieving only 42.6% of its cost. By comparison, the more costly scheme [37] consumes nearly 454 ms, approximately 5.6 times higher than the proposed protocol.

On the cluster controller side, the computational cost is 5Tem, notably less than that of other protocols. For example, scheme [35] performs several bilinear pairings and scalar multiplications, incurring 21.89 ms, whereas the proposed protocol only needs 3.77 ms, about 17.2% of the cost. This significantly alleviates computational overhead.

The Figure 2 demonstrates a linear growth trend in computational cost as n increases. The proposed scheme’s curve remains significantly lower than others, with a gentler slope, reflecting strong scalability. As n grows from 10 to 50, the proposed protocol’s cost increases by about 64.4 ms, compared with 350–450 ms for other protocols. This highlights the advantage of the proposed protocol under large-scale parameters.

The findings confirm that the proposed scheme excels over existing protocols both in computational complexity and real-world execution efficiency. By minimizing expensive bilinear pairings and elliptic curve scalar operations, the scheme cuts resource usage by about 60%–80%. This is crucial for resource-limited devices like UAV, improving response speed while markedly reducing energy consumption, thereby strengthening system stability and security.

5.2 Communication cost

In the authentication phase, the total amount of messages transmitted between different entities is regarded as the communication cost. Table 5 presents the communication overhead of all the compared schemes. For communication cost estimation, the following assumptions are made: a timestamp of 4 bytes, a random number of 40 bytes, an identity size of 32 bytes, a hash output of 20 bytes, and an ECC point of 64 bytes. Table 5 and Figure 3 clearly demonstrate that the proposed scheme achieves a remarkable reduction in communication overhead relative to other existing protocols. Table 5 provides the total communication costs of five protocols, expressed in bytes for comparison. Specifically, the communication cost of the proposed scheme is 160 bytes, compared to 104 bytes for scheme [34], 388 bytes for scheme [35], 352 bytes for scheme [36], and 190 bytes for scheme [37]. This indicates that the proposed scheme substantially reduces communication costs while ensuring security and functionality.

Table 5
www.frontiersin.org

Table 5. Comparison on communication cost.

Figure 3
Bar chart comparing communication overhead in bytes across five categories: [35], [36], [37], [38], and Our. [36] and [37] have the highest overhead at approximately 400 bytes, followed by [38] around 200 bytes, [35] and Our both around 100 bytes.

Figure 3. The comparisons of Communication cost.

Figure 3 further highlights the communication overhead differences among these protocols. The proposed protocol shows a dramatic reduction—over 60%—compared with schemes [35, 36]. Although scheme [34] incurs relatively low overhead, it is still about 60 bytes higher than the proposed scheme, likely due to its restricted features or simplified design. Notably, schemes [35, 36] consume 388 and 352 bytes respectively, suggesting the inclusion of additional cryptographic operations or protocol complexity that drive up communication costs. From a security perspective, the proposed scheme maintains robust protection while employing efficient communication mechanisms that minimize redundant transmissions, thereby reducing overhead. This renders the scheme particularly well-suited to resource-constrained environments like UAV group communication and IoT networks, which impose stringent requirements on computation and bandwidth.

In conclusion, the proposed protocol clearly demonstrates superior communication efficiency, drastically reducing overhead while preserving strong security and scalability. Practically, in high-latency and bandwidth-expensive environments, the low communication overhead of the proposed scheme will substantially improve system performance and operability. Therefore, the proposed scheme provides clear advantages in real-world applications, fulfilling the need for efficient and secure communication.

6 Conclusion

As UAV cluster communication technology advances, coordinated operations among multiple UAV have become a practical reality. Nevertheless, UAV cluster communication in open environments encounters significant security challenges, especially under dynamic topologies and resource-constrained conditions. To overcome these challenges, we propose an efficient group key agreement scheme designed to improve both the security and efficiency of UAV cluster communication. The proposed protocol leverages elliptic curve-based signatures for device authentication and message verification, while offloading intensive computations to the ground control station through group key agreement, thus alleviating the computational burden on UAV. In addition, the scheme enables secure authentication and key updates for UAV during dynamic join and leave operations, thereby maintaining secure and adaptive group communications. Formal security proofs and performance evaluations show that the proposed scheme provides notable improvements in resilience against attacks, computational efficiency, and communication cost. Overall, it delivers a more secure and efficient solution for UAV cluster communication.

Data availability statement

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.

Author contributions

ZW: Project administration, Formal Analysis, Validation, Resources, Writing – original draft, Investigation, Visualization, Conceptualization. JL: Data curation, Methodology, Writing – review and editing, Software, Supervision. SY: Data curation, Writing – review and editing, Software, Supervision, Methodology. YZ: Supervision, Software, Methodology, Writing – review and editing, Data curation.

Funding

The author(s) declared that financial support was not received for this work and/or its publication.

Conflict of interest

The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Generative AI statement

The author(s) declared that generative AI was not used in the creation of this manuscript.

Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Wan F, Yaseen MB, Riaz MB, Shafiq A, Thakur A, Rahman MO. Advancements and challenges in UAV-Based communication networks: a comprehensive scholarly analysis. Results Eng (2024) 24:103271. doi:10.1016/j.rineng.2024.103271

CrossRef Full Text | Google Scholar

2. Chen J, Li T, Zhang Y, You T, Lu Y, Tiwari P, et al. Global-and-Local attention-based reinforcement learning for cooperative behaviour control of multiple UAVs. IEEE Trans Vehicular Technology (2024) 73(3):4194–206. doi:10.1109/TVT.2023.3327

CrossRef Full Text | Google Scholar

3. Xiao N, Wang Z, Sun X, Miao J. A novel blockchain-based digital forensics framework for preserving evidence and enabling investigation in industrial internet of things. Alexandria Eng J (2024) 86:631–43. doi:10.1016/j.aej.2023.12.021

CrossRef Full Text | Google Scholar

4. Miao J, Ning X, Hong S, Wang L, Liu B. Secure and efficient authentication protocol for supply chain systems in artificial intelligence-based internet of things. IEEE Internet Things J (2025) 12(19):39532–42. doi:10.1109/jiot.2025.3592401

CrossRef Full Text | Google Scholar

5. Dong R, Wang B, Cao K, Tian J, Cheng T. Secure transmission design of RIS enabled UAV communication networks exploiting deep reinforcement learning. IEEE Trans Vehicular Technology (2024) 73(6):8404–19. doi:10.1109/tvt.2024.3357821

CrossRef Full Text | Google Scholar

6. Sharma P, Purushothama BR. BP-MGKM: an efficient multi-group key management scheme based on bivariate polynomial. Computer Networks (2022) 216:109244. doi:10.1016/j.comnet.2022.109244

CrossRef Full Text | Google Scholar

7. Hsu C, Harn L, Xia Z, Cui J, Chen J. Construction of lightweight authenticated joint arithmetic computation for 5G IoT networks. The Computer J (2023) 66(1):208–20. doi:10.1093/comjnl/bxab155

CrossRef Full Text | Google Scholar

8. Tian Y, Yuan J, Song H. Efficient privacy-preserving authentication framework for edge-assisted internet of drones. J Inf Security Appl (2019) 48:102354. doi:10.1016/j.jisa.2019.06.010

CrossRef Full Text | Google Scholar

9. Zhang Y, He D, Li L, Chen B. A lightweight authentication and key agreement scheme for internet of drones. Computer Commun (2020) 154:455–64. doi:10.1016/j.comcom.2020.02.067

CrossRef Full Text | Google Scholar

10. Semal B, Markantonakis K, Akram RN. A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. In: 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC). IEEE (2018). p. 1–8.

CrossRef Full Text | Google Scholar

11. Luo M, Wu J, Li X. Cross-domain certificateless authenticated group key agreement protocol for 5G network slicings. Telecommunication Syst (2020) 74(4):437–49. doi:10.1007/s11235-020-00673-x

CrossRef Full Text | Google Scholar

12. Pan X, Jin Y, Li F. Anefficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles. J Syst Architecture (2023) 136:102821. doi:10.1016/j.sysarc.2022.102821

CrossRef Full Text | Google Scholar

13. Braeken A. Pairing free certified common asymmetric group key agreement protocol for data sharing among users with different access rights. Wireless Personal Commun (2021) 121(1):307–18. doi:10.1007/s11277-021-08636-4

PubMed Abstract | CrossRef Full Text | Google Scholar

14. Kermanshahi SK, Salleh M. An enhanced certificateless cryptosystem for Mobile ad hoc networ ks. In: 2014 international symposium on biometrics and security technologies (ISBAST). NJ: IEE E (2014). p. 176–81.

Google Scholar

15. Eissa T, Razak SA, Ngadi MA. A novel lightweight authentication scheme for mobile ad hoc networks. Arabian J Sci Eng (2012) 37:2179–92. doi:10.1007/s13369-012-0318-y

CrossRef Full Text | Google Scholar

16. Kumar A, Tripathi S. A pairing free anonymous certificateless group key agreement protocol for dynamic group. Wireless Personal Commun (2015) 82:1027–45. doi:10.1007/s11277-014-2264-3

CrossRef Full Text | Google Scholar

17. Ayad A, Hammal Y. An Efficient authenticated group key agreement protocol for dynamic U AV fleets in untrusted environments. In: 2021 International Conference on Networking and Adva nced Systems (ICNAS). IEEE (2021). p. 1–8.

Google Scholar

18. Frimpong E, Rabbaninejad R, Michalas A. Arrows in a quiver: a secure certificateless group ke y distribution protocol for drones. Secure IT systems. In: 26th Nordic Conference, NordSec 2021, Virtual Event, November 29–30, 2021, Proceedings 26. Springer International Publishing (2021). p. 31–48.

CrossRef Full Text | Google Scholar

19. Li J, Qiao Z, Peng J. Asymmetric group key agreement protocol based on blockchain and attribute for industrial internet of things. IEEE Trans Ind Inform (2022) 18(11):8326–35. doi:10.1109/tii.2022.3176048

CrossRef Full Text | Google Scholar

20. Zhang Q, Li Y, Wang R, Li J, Gan Y, Zhang Y, et al. Blockchain-based asymmetric group key agreement protocol for internet of vehicles. Comput & Electr Eng (2020) 86:106713. doi:10.1016/j.compeleceng.2020.106713

CrossRef Full Text | Google Scholar

21. Naresh VS, Allavarpu VD, Reddi S. Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN. The J Supercomputing (2022) 78(6):8708–32. doi:10.1007/s11227-021-04175-8

CrossRef Full Text | Google Scholar

22. Tian Y, Wang Z, Xiong J, Ma J. A blockchain-based secure key management scheme with trustworthiness in DWSNs. IEEE Trans Ind Inform (2020) 16(9):6193–202. doi:10.1109/tii.2020.2965975

CrossRef Full Text | Google Scholar

23. Miao J, Wang Z, Ning X, Shankar A, Maple C, Rodrigues JJ. A UAV-assisted authentication protocol for internet of vehicles. IEEE Trans Intell Transportation Syst (2024) 25(8):10286–97. doi:10.1109/tits.2024.3360251

CrossRef Full Text | Google Scholar

24. Huang W. ECC-Based three-factor authentication and key agreement scheme for wireless sensor networks. Scientific Rep (2024) 14(1):1787. doi:10.1038/s41598-024-52134-z

PubMed Abstract | CrossRef Full Text | Google Scholar

25. Zou S, Cao Q, Wang C, Huang Z, Xu G. A robust two-factor user authentication scheme-based ECC for smart home in IoT. IEEE Syst J (2021) 16(3):4938–49. doi:10.1109/jsyst.2021.3127438

CrossRef Full Text | Google Scholar

26. Hasan MK, Weichen Z, Safie N, Ahmed FRA, Ghazal TM. A survey on key agreement and authentication protocol for internet of things application. IEEE Access (2024) 12:61642–66. doi:10.1109/access.2024.3393567

CrossRef Full Text | Google Scholar

27. Kumari D, Singh K. Lightweight secure authentication and key agreement technique for smart grid. Peer-to-Peer Networking Appl (2024) 17(1):451–78. doi:10.1007/s12083-023-01585-8

CrossRef Full Text | Google Scholar

28. Chaudhary D, Dadsena PK, Padmavathi A, Mehedi Hassan M, Fahad Alkhamees B, Kumar U. Anonymous quantum safe construction of three party authentication and key agreement protocol for mobile devices. IEEE Access (2024) 12:74572–85. doi:10.1109/access.2024.3404232

CrossRef Full Text | Google Scholar

29. Liu L, Jia Y. Analysis of one lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. Int J Netw Secur (2024) 26(1):138–41. doi:10.6633/IJNS.202401

CrossRef Full Text | Google Scholar

30. Li Z, Ju Z, Zhao H. A lightweight certificateless authenticated key agreement scheme based on chebyshev polynomials for the internet of drones. Sensors (2025). doi:10.3390/s25144286

PubMed Abstract | CrossRef Full Text | Google Scholar

31. Ayad A, Hammal Y. An efficient authenticated group key agreement protocol for dynamic UAV fleets in untrusted environments. In: 2021 International Conference on Networking and Advanced Systems (ICNAS). IEEE (2021). p. 1–8.

CrossRef Full Text | Google Scholar

32. Zhang L, Xu J, Obaidat MS, Li X, Vijayakumar P. A PUF-based lightweight authentication and key agreement protocol for smart UAV networks. IET Commun (2022) 16(10):1142–59. doi:10.1049/cmu2.12295

CrossRef Full Text | Google Scholar

33. Khan MA, Ullah I, Kumar N, Oubbati OS, Qureshi IM, Noor F, et al. An efficient and secure certificate-based access control and key agreement scheme for flying ad-hoc networks. IEEE Trans Vehicular Technology (2021) 70(5):4839–51. doi:10.1109/tvt.2021.3055895

CrossRef Full Text | Google Scholar

34. Li X, Liu P, Zhang S, Xie Y. An improved secure and efficient group key agreement scheme in VANETs. Int J Commun Syst (2022) 35(3):e5025. doi:10.1002/dac.5025

CrossRef Full Text | Google Scholar

35. Liu L, Wang Y, Zhang J, Yang Q. A secure and efficient group key agreement scheme for VANETs. Sensors (2019) 19(3):482–96. doi:10.3390/s19030482

PubMed Abstract | CrossRef Full Text | Google Scholar

36. Zhou Y, Long X, Chen L, Yang Z. Conditional privacy-preserving authentication and key agreement scheme for roaming services inVANETs. J Inf Secur Appl (2019) 47:295–301. doi:10.1016/j.jisa.2019.05.018

CrossRef Full Text | Google Scholar

37. Zhang L, Wu Q, Domingo-Ferrer J, Qin B, Hu C. Distributed aggregate privacy-preserving authentication in VANETs. IEEE Transintell Transp Syst (2017) 18(3):516–26. doi:10.1109/tits.2016.2579162

CrossRef Full Text | Google Scholar

Keywords: UAV, group communication, authentication, anonymous, group key agreement, ellipticcurve cryptography

Citation: Wang Z, Li J, Yuan S and Zhang Y (2026) An efficient group key agreement scheme for UAV swarms. Front. Phys. 14:1698126. doi: 10.3389/fphy.2026.1698126

Received: 03 September 2025; Accepted: 12 January 2026;
Published: 02 February 2026.

Edited by:

Youssri Hassan Youssri, Egypt Uinversity of Informatics, Egypt

Reviewed by:

Omprakash Kaiwartya, Nottingham Trent University, United Kingdom
Rajkumar S. C., Anna University Chennai - Regional Campus Madurai, India

Copyright © 2026 Wang, Li, Yuan and Zhang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Yinuo Zhang, MzUyMTIwMTkwMzFAbnVlLmVkdS5jbg==

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.