Scalable Topologies for Time-Optimal Authentication of UAV Swarms

Gaurang Bansal, Vinay Chamola, Nirwan Ansari, Biplab Sikdar

Research output: Contribution to journalArticlepeer-review


Swarm-based Unmanned Aerial Vehicle (UAV) applications require a large number of UAVs to be deployed across a region to work cooperatively. To operate a large number of unattended UAVs in hostile environments, it is critical to secure UAV-BS (base station) communications. UAV authentication based on Physical Unclonable Functions (PUFs) has recently emerged as a potential solution for overcoming adversarial attacks. The performance of PUF-based authentication protocols is strongly influenced by various factors, including the time required to generate the topology, the number of bottleneck connections, and the network's traffic load. This article investigates how the authentication time for a UAV swarm is affected by various factors such as the type of topology, number of UAVs in the swarm and the number of parallel connections.

Original languageEnglish (US)
Pages (from-to)1-8
Number of pages8
JournalIEEE Network
StateAccepted/In press - 2022

All Science Journal Classification (ASJC) codes

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications


  • Authentication
  • Autonomous aerial vehicles
  • Base stations
  • Cryptography
  • Network topology
  • Protocols
  • Topology


Dive into the research topics of 'Scalable Topologies for Time-Optimal Authentication of UAV Swarms'. Together they form a unique fingerprint.

Cite this