{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T05:01:14Z","timestamp":1773810074678,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T00:00:00Z","timestamp":1734480000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T00:00:00Z","timestamp":1734480000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Manipal Academy of Higher Education, Manipal"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Unmanned aerial vehicles, commonly known as drones, face unique authentication challenges due to their distinct characteristics and operational environments. These challenges include identity management, secure key management, secure communication channels, and limited resources. To address these challenges, we propose a dual-layer authentication scheme utilizing Advanced Encryption Standard and Elliptic Curve Cryptography on Field-Programmable Gate Arrays. This scheme leverages the flexibility and programmability of Field-Programmable Gate Arrays incorporated in drones to enhance security. The integration of Advanced Encryption Standard on Field-Programmable Gate Arrays provides a robust solution to withstand various attacks such as impersonation, tampering, and replay attacks. Simulation results in Xilinx Vivado demonstrate the efficiency and effectiveness of the proposed scheme compared to existing methods.<\/jats:p>","DOI":"10.1186\/s13638-024-02419-8","type":"journal-article","created":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T17:47:46Z","timestamp":1734544066000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["FPGA-based dual-layer authentication scheme utilizing AES and ECC for unmanned aerial vehicles"],"prefix":"10.1186","volume":"2024","author":[{"given":"Kumar Sekhar","family":"Roy","sequence":"first","affiliation":[]},{"given":"Murikipudi","family":"Sujith","sequence":"additional","affiliation":[]},{"given":"Bandi","family":"Bhanu","sequence":"additional","affiliation":[]},{"family":"Preethi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5502-171X","authenticated-orcid":false,"given":"Ruhul Amin","family":"Hazarika","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,18]]},"reference":[{"key":"2419_CR1","doi-asserted-by":"crossref","unstructured":"C.\u00a0Dong, F.\u00a0Jiang, S.\u00a0Chen, X.\u00a0Liu, \u201cContinuous authentication for uav delivery systems under zero-trust security framework,\u201d in 2022 IEEE International Conference on Edge Computing and Communications (EDGE), pp.\u00a0123\u2013132, IEEE, (2022)","DOI":"10.1109\/EDGE55608.2022.00027"},{"issue":"1","key":"2419_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3390\/electronics9010062","volume":"9","author":"C-L Chen","year":"2020","unstructured":"C.-L. Chen, Y.-Y. Deng, W. Weng, C.-H. Chen, Y.-J. Chiu, C.-M. Wu, A traceable and privacy-preserving authentication for uav communication control system. Electronics 9(1), 62 (2020)","journal-title":"Electronics"},{"issue":"3","key":"2419_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MWC.002.2100594","volume":"29","author":"Y Tan","year":"2022","unstructured":"Y. Tan, J. Liu, N. Kato, Blockchain-based lightweight authentication for resilient uav communications: Architecture, scheme, and future directions. IEEE Wireless Communications 29(3), 24\u201331 (2022)","journal-title":"IEEE Wireless Communications"},{"issue":"3","key":"2419_CR4","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1080\/09662839.2022.2101885","volume":"31","author":"A Calderaro","year":"2022","unstructured":"A. Calderaro, S. Blumfelde, Artificial intelligence and eu security: the false promise of digital sovereignty. European Security 31(3), 415\u2013434 (2022)","journal-title":"European Security"},{"key":"2419_CR5","doi-asserted-by":"crossref","unstructured":"X.\u00a0Xu, J.\u00a0Zhang, \u201cRethinking fpga security in the new era of artificial intelligence,\u201d in 2020 21st International Symposium on Quality Electronic Design (ISQED), pp.\u00a046\u201351, IEEE, (2020)","DOI":"10.1109\/ISQED48828.2020.9136974"},{"key":"2419_CR6","doi-asserted-by":"crossref","unstructured":"C.\u00a0Nwachioma, M.\u00a0Ezuma, O.O. Medaiyese, \u201cFpga prototyping of synchronized chaotic map for uav secure communication,\u201d in 2021 IEEE Aerospace Conference (50100), pp.\u00a01\u20137, IEEE, (2021)","DOI":"10.1109\/AERO50100.2021.9438428"},{"issue":"2","key":"2419_CR7","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.jksues.2018.07.002","volume":"32","author":"H Zodpe","year":"2020","unstructured":"H. Zodpe, A. Sapkal, An efficient aes implementation using fpga with enhanced security features. Journal of King Saud University-Engineering Sciences 32(2), 115\u2013122 (2020)","journal-title":"Journal of King Saud University-Engineering Sciences"},{"issue":"1","key":"2419_CR8","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MAP.2003.1189650","volume":"45","author":"DH Werner","year":"2003","unstructured":"D.H. Werner, S. Ganguly, An overview of fractal antenna engineering research. IEEE Antennas and propagation Magazine 45(1), 38\u201357 (2003)","journal-title":"IEEE Antennas and propagation Magazine"},{"issue":"9","key":"2419_CR9","doi-asserted-by":"publisher","first-page":"714","DOI":"10.3390\/e20090714","volume":"20","author":"E Guariglia","year":"2018","unstructured":"E. Guariglia, Harmonic sierpinski gasket and applications. Entropy 20(9), 714 (2018)","journal-title":"Entropy"},{"key":"2419_CR10","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/LAWP.2007.902045","volume":"6","author":"KC Hwang","year":"2007","unstructured":"K.C. Hwang, A modified sierpinski fractal antenna for multiband application. IEEE antennas and wireless propagation letters 6, 357\u2013360 (2007)","journal-title":"IEEE antennas and wireless propagation letters"},{"issue":"3","key":"2419_CR11","doi-asserted-by":"publisher","first-page":"84","DOI":"10.3390\/e18030084","volume":"18","author":"E Guariglia","year":"2016","unstructured":"E. Guariglia, Entropy and fractal antennas. Entropy 18(3), 84 (2016)","journal-title":"Entropy"},{"issue":"01","key":"2419_CR12","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1142\/S0218348X99000098","volume":"7","author":"RG Hohlfeld","year":"1999","unstructured":"R.G. Hohlfeld, N. Cohen, Self-similarity and the geometric requirements for frequency independence in antennae. Fractals 7(01), 79\u201384 (1999)","journal-title":"Fractals"},{"issue":"9","key":"2419_CR13","doi-asserted-by":"publisher","first-page":"6345","DOI":"10.1109\/TCOMM.2021.3088898","volume":"69","author":"Z Lin","year":"2021","unstructured":"Z. Lin, M. Lin, B. Champagne, W.-P. Zhu, N. Al-Dhahir, Secrecy-energy efficient hybrid beamforming for satellite-terrestrial integrated networks. IEEE Transactions on Communications 69(9), 6345\u20136360 (2021)","journal-title":"IEEE Transactions on Communications"},{"issue":"2","key":"2419_CR14","first-page":"2085","volume":"59","author":"Z Lin","year":"2022","unstructured":"Z. Lin, K. An, H. Niu, Y. Hu, S. Chatzinotas, G. Zheng, J. Wang, Slnr-based secure energy efficient beamforming in multibeam satellite systems. IEEE Transactions on Aerospace and Electronic Systems 59(2), 2085\u20132088 (2022)","journal-title":"IEEE Transactions on Aerospace and Electronic Systems"},{"issue":"5","key":"2419_CR15","doi-asserted-by":"publisher","first-page":"1714","DOI":"10.1109\/TII.2015.2489610","volume":"12","author":"H Zhang","year":"2015","unstructured":"H. Zhang, H. Xing, J. Cheng, A. Nallanathan, V.C. Leung, Secure resource allocation for ofdma two-way relay wireless sensor networks without and with cooperative jamming. IEEE Transactions on industrial informatics 12(5), 1714\u20131725 (2015)","journal-title":"IEEE Transactions on industrial informatics"},{"issue":"14","key":"2419_CR16","doi-asserted-by":"publisher","first-page":"11123","DOI":"10.1109\/JIOT.2021.3051603","volume":"8","author":"Z Lin","year":"2021","unstructured":"Z. Lin, M. Lin, T. De Cola, J.-B. Wang, W.-P. Zhu, J. Cheng, Supporting iot with rate-splitting multiple access in satellite and aerial-integrated networks. IEEE Internet of Things Journal 8(14), 11123\u201311134 (2021)","journal-title":"IEEE Internet of Things Journal"},{"key":"2419_CR17","doi-asserted-by":"crossref","unstructured":"T.\u00a0Good, M.\u00a0Benaissa, \u201cAes on fpga from the fastest to the smallest,\u201d in Cryptographic Hardware and Embedded Systems\u2013CHES 2005: 7th International Workshop, Edinburgh, UK, August 29\u2013September 1, 2005. Proceedings 7, pp.\u00a0427\u2013440, Springer, (2005)","DOI":"10.1007\/11545262_31"},{"key":"2419_CR18","doi-asserted-by":"crossref","unstructured":"N.\u00a0Koblitz, \u201cElliptic curve cryptosystems. mathematics of computation,\u201d vol.\u00a048, no.\u00a0177, pp.\u00a0203\u2013209, (1987)","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"2419_CR19","unstructured":"Y.F. Huang, \u201cAlgorithm for elliptic curve diffie-hellman key exchange based on dna title self-assembly,\u201d Proceedings of 46th IEEE Theories and Applications, (2008)"},{"key":"2419_CR20","doi-asserted-by":"crossref","unstructured":"M.\u00a0McLoone, J.\u00a0McCanny, \u201cHigh-performance fpga implementation of des using a novel method for implementing the critical schedule,\u201d IEE Proc.-Circuits Devices Syst., 150(5), (2003)","DOI":"10.1049\/ip-cds:20030574"},{"key":"2419_CR21","doi-asserted-by":"publisher","first-page":"107999","DOI":"10.1016\/j.comnet.2021.107999","volume":"191","author":"SA Chaudhry","year":"2021","unstructured":"S.A. Chaudhry, K. Yahya, M. Karuppiah, R. Kharel, A.K. Bashir, Y.B. Zikria, Gcacs-iod: A certificate based generic access control scheme for internet of drones. Computer Networks 191, 107999 (2021)","journal-title":"Computer Networks"},{"key":"2419_CR22","doi-asserted-by":"publisher","first-page":"3319","DOI":"10.1007\/s12083-021-01130-5","volume":"14","author":"N Zhang","year":"2021","unstructured":"N. Zhang, Q. Jiang, L. Li, X. Ma, J. Ma, An efficient three-factor remote user authentication protocol based on bpv-fourq for internet of drones. Peer-to-Peer Networking and Applications 14, 3319\u20133332 (2021)","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"12","key":"2419_CR23","doi-asserted-by":"publisher","first-page":"9918","DOI":"10.1109\/JIOT.2022.3163367","volume":"9","author":"C Pu","year":"2022","unstructured":"C. Pu, A. Wall, K.-K.R. Choo, I. Ahmed, S. Lim, A lightweight and privacy-preserving mutual authentication and key agreement protocol for internet of drones environment. IEEE Internet of Things Journal 9(12), 9918\u20139933 (2022)","journal-title":"IEEE Internet of Things Journal"},{"key":"2419_CR24","doi-asserted-by":"publisher","first-page":"100669","DOI":"10.1016\/j.iot.2022.100669","volume":"21","author":"D Chaudhary","year":"2023","unstructured":"D. Chaudhary, T. Soni, K.L. Vasudev, K. Saleem, A modified lightweight authenticated key agreement protocol for internet of drones. Internet of Things 21, 100669 (2023)","journal-title":"Internet of Things"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-024-02419-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-024-02419-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-024-02419-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T18:09:16Z","timestamp":1734545356000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-024-02419-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,18]]},"references-count":24,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["2419"],"URL":"https:\/\/doi.org\/10.1186\/s13638-024-02419-8","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,18]]},"assertion":[{"value":"10 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"No ethical approval required for the work.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"There were no human participants and\/or animals involved in the research.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human participants and\/or animals"}},{"value":"No potential conflict of interest is disclosed by the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"91"}}