Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
An intelligent and adaptive security framework for UAV swarms: a cross-layer approach integrating highly reliable EPUF, DRL-based key management, and distributed ledger technology
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 09 April 2026

An intelligent and adaptive security framework for UAV swarms: a cross-layer approach integrating highly reliable EPUF, DRL-based key management, and distributed ledger technology

  • Hyunseok Kim1 &
  • Sungdo Kim2 

Scientific Reports (2026) Cite this article

  • 944 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

The proliferation of unmanned aerial vehicle (UAV) swarms in mission-critical applications for 6G and the Internet of Things (IoT) introduces significant security vulnerabilities stemming from their dynamic, distributed, and resource-constrained nature. Traditional security paradigms are often inadequate for these complex cyber-physical systems. This paper proposes a novel, cross-layer security framework that ensures robust and lightweight operation for UAV swarms. The framework is founded on a novel Entropy-Derived Physically Unclonable Function (EPUF) based on DRAM, which employs a data-driven characterization process designed to achieve near 100% reliability in simulation through a data-driven characterization process, which is validated through extensive simulation, addressing a critical limitation of conventional PUFs. To counteract sophisticated threats, we formulate the key management problem as a Markov Decision Process (MDP) and introduce a deep reinforcement learning (DRL) agent that dynamically optimizes key update frequency, balancing security posture against energy consumption. Furthermore, we leverage a lightweight, permissioned blockchain as a decentralized trust anchor for public key management, providing an immutable and resilient ledger and enhancing the principles of distributed and edge intelligence. The core authentication protocol’s security is formally verified using the ProVerif tool and Belief Logic, proving its robustness against a Dolev–Yao adversary. Experimental simulations demonstrate that our framework significantly outperforms conventional methods, reducing authentication latency and energy consumption by over 95% compared to PKI-based schemes while effectively mitigating replay and impersonation attacks.

Similar content being viewed by others

UAV-asisted IoT network framework with hybrid deep reinforcement and federated learning

Article Open access 23 October 2025

Secure and energy-efficient transmission in UAV-assisted intelligent reflecting surface networks

Article Open access 03 October 2025

SOBV-FEF: secure lightweight data offloading base in blockchain technology for internet of vehicles enabled handover UAVs within a Fog-Edge federation

Article Open access 04 December 2025

Data availability

The datasets generated and/or analysed during the current study are available from the corresponding author on reasonable request.

Code availability

The custom code and mathematical algorithms used in this study, including the EPUF simulation model and the DRL-based key management framework, are available from the corresponding author upon reasonable request. The formal verification models conducted via ProVerif are also available for review.

References

  1. Hua, M. et al. UAV-Assisted Intelligent Reflecting Surface Symbiotic Radio System. IEEE Trans. Wirel. Commun. 20, 6023–6037 (2021).

    Google Scholar 

  2. Wang, Z. et al. A survey on cybersecurity attacks and defenses for unmanned aerial systems. J. Syst. Archit. 138, 102870 (2023).

    Google Scholar 

  3. Essaky, S., Raja, G., Dev, K. & Niyato, D. ARReSVG: Intelligent multi-UAV navigation in partially observable spaces using adaptive deep reinforcement learning approach. IEEE Trans. Veh. Technol. 74, 100–115 (2025).

    Google Scholar 

  4. Zhou, Y. et al. QoE-Driven Adaptive Deployment Strategy of Multi-UAV Networks Based on Hybrid Deep Reinforcement Learning. IEEE Internet Things J. 9, 5868–5881 (2022).

    Google Scholar 

  5. Bai, J., Huang, G., Zhang, S., Zeng, Z. & Liu, A. GA-DCTSP: An intelligent active data processing scheme for UAV-enabled edge computing. IEEE Internet Things J. 10, 4891–4906 (2023).

    Google Scholar 

  6. Zhou, Y., Jin, Z., Shi, H., Shi, L. & Lu, N. Flying IRS: QoE-driven trajectory optimization and resource allocation based on adaptive deployment for WPCNs in 6G IoT. IEEE Internet Things J. 11, 9031–9046 (2024).

    Google Scholar 

  7. Blanchet, B. Modeling and verifying security protocols with the applied pi calculus and ProVerif. Found. Trends Priv. Secur. 1, 1–135 (2016).

    Google Scholar 

  8. Burrows, M., Abadi, M. & Needham, R. A logic of authentication. ACM Trans. Comput. Syst. (TOCS) 8, 18–36 (1990).

    Google Scholar 

  9. Mozaffari, M., Saad, W., Bennis, M., Nam, Y. H. & Debbah, M. A tutorial on UAVs for wireless networks: Applications, challenges, and open problems. IEEE Commun. Surv. Tutor. 21, 2334–2360 (2019).

    Google Scholar 

  10. Tan, J. et al. A survey: When moving target defense meets game theory. Comput. Sci. Rev. 48, 100544 (2023).

    Google Scholar 

  11. Zhou, Y., Cheng, G., Du, K., Chen, Z., Qin, T., Zhao, Y. From Static to Adaptive Defense: Federated Multi-Agent Deep Reinforcement Learning-Driven Moving Target Defense Against DoS Attacks in UAV Swarm Networks. (2025) arXiv arXiv:2506.07392.

  12. Mnih, V. et al. Human-level control through deep reinforcement learning. Nature 518, 529–533 (2015).

    Google Scholar 

  13. Wireless blockchain meets 6g. IEEE Communications Surveys & Tutorials.

  14. Lightweight anonymous authentication for IoT. IEEE Access.

  15. Bi, Y., Wang, X., Zhao, C., Jin, Z. & Li, H. DRAM-based intrinsic physically unclonable functions for system-level security and authentication. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 24, 3144–3156 (2016).

    Google Scholar 

  16. Rahmani, R., Firouzi, R. & Kanter, T. Distributed adaptive formation control for multi-UAV to enable connectivity. IJCSI Int. J. Comput. Sci. Issues 17, 10–18 (2020).

    Google Scholar 

  17. Dong, L., Liu, Z., Jiang, F. & Wang, K. Joint optimization of deployment and trajectory in UAV and IRS-assisted IoT data collection system. IEEE Internet Things J. 9, 21583–21593 (2022).

    Google Scholar 

  18. Min, Z., Zhang, X., Zhang, X., Lei, T., Gao, Q. A Data-Driven MPC Energy Optimization Management Strategy for Fuel Cell Distributed Electric Propulsion UAV, in: Proceedings of the 2022 4th Asia Energy and Electrical Engineering Symposium (AEEES), Chengdu, China, 25–28 March 2022; pp. 1–6, (2022).

  19. Tse, D. & Viswanath, P. Fundamentals of Wireless Communication 1–715 (Cambridge University Press, 2005).

    Google Scholar 

  20. Yu, Y. et al. Distributed Multi-Agent Target Tracking: A Nash-Combined Adaptive Differential Evolution Method for UAV Systems. IEEE Trans. Veh. Technol. 70, 8122–8133 (2021).

    Google Scholar 

  21. Chaudhry, S. A., Al-shehri, M. H., Al-Sodairi, K. A. & Das, M. L. A lightweight and provably secure anonymous authentication and key agreement scheme for IoT-based cloud environment. IEEE Access 9, 71110–71123 (2021).

    Google Scholar 

  22. Ardeshir-Larijani, A.G., McGoldrick, C.P.T., Martin, E. PUF-based authentication protocols for resource-constrained devices, in: Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Washington, DC, USA, 30 April–4 May 2018; pp. 1–6, (2018).

  23. Olfati-Saber, R., Fax, J. A. & Murray, R. M. Consensus and cooperation in networked multi-agent systems. Proc. IEEE 95, 215–233 (2007).

    Google Scholar 

Download references

Acknowledgements

This work was supported by the 2026 research fund of the Korea Military Academy (Hwarangdae Research Institute) (RN 26-AI-06).

Funding

This work was supported by the 2026 research fund of the Korea Military Academy (Hwarangdae Research Institute) (RN 26-AI-06).

Author information

Authors and Affiliations

  1. Department of Computer Science, Korea Military Academy, Seoul, 01805, Republic of Korea

    Hyunseok Kim

  2. Department of Advanced Technology Convergence, Changwon National University, Changwon, 51140, Republic of Korea

    Sungdo Kim

Authors
  1. Hyunseok Kim
    View author publications

    Search author on:PubMed Google Scholar

  2. Sungdo Kim
    View author publications

    Search author on:PubMed Google Scholar

Contributions

H.K. conceptualized the initial framework, performed the simulations, wrote the initial draft, designed the novel EPUF-based authentication protocol, formulated the DRL-based key management model, and S.K. (Sungdo Kim) guided the formal security analysis, and substantially revised the manuscript. Both authors read and approved the final manuscript.

Corresponding author

Correspondence to Sungdo Kim.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

A Hardware validation testbed for EPUF

A Hardware validation testbed for EPUF

This appendix outlines a detailed plan for a hardware-based validation of the EPUF to provide stronger empirical justification for the high reliability claim, which was primarily supported by simulation results in this paper. This validation will quantitatively assess the Bit Error Rate (BER) of the EPUF under varying environmental conditions, such as temperature and voltage fluctuations.

A.1 Testbed configuration

The hardware validation will be performed on a dedicated FPGA-based testbed designed to accurately measure the EPUF’s performance in a controlled environment. The key components of the testbed are as follows:

  • FPGA Board: A commercial FPGA board, such as the Xilinx Artix-7 or Intel Cyclone V, will be used to implement the EPUF logic. The FPGA’s integrated DDR3 memory will serve as the physical entropy source for the EPUF, eliminating the need for an external DRAM module. The FPGA’s logic fabric will host the EPUF controller, the fuzzy extractor, and the communication interface for data logging.

  • Environmental Chamber: A programmable temperature and humidity chamber (e.g., from Thermotron or Espec) will be used to subject the FPGA board to a controlled range of operating temperatures, from −40 \(^\circ\)C to 85 \(^\circ\)C. This range is chosen to cover the typical military and industrial temperature grades for electronics.

  • Voltage Controller: A precision programmable DC power supply will be used to control the voltage supplied to the EPUF circuitry, enabling us to test its stability under voltage variations within a ±10% range of the nominal value (e.g., 1.5 V or 1.2 V).

  • Measurement and Control System: A host PC running a control script (e.g., in Python with an API for the power supply and environmental chamber) will automate the entire experiment. This system will program the environmental chamber, send challenges to the FPGA, receive the generated EPUF responses, and log all relevant data, including timestamp, temperature, voltage, challenge, response, and calculated BER.

A.2 Validation procedure and metrics

The reliability of the EPUF will be rigorously validated through the following steps and evaluated using the Bit Error Rate (BER) metric. The BER will be defined as the number of differing bits between the generated response and the golden response, divided by the total number of bits compared.

  1. 1.

    Initial Profiling (Enrollment): At a nominal reference condition (e.g., 25 \(^\circ\)C, nominal voltage), the EPUF response will be generated and captured over one million times. These data will be used to create the a ‘golden profile’ for subsequent comparisons. The fuzzy extractor’s helper data, which assists in correcting minor bit flips, will also be generated during this phase.

  2. 2.

    Environmental Stress Testing: The FPGA board will be placed inside the environmental chamber. The temperature will be varied across the specified range (−40 \(^\circ\)C to 85 \(^\circ\)C) in 10 \(^\circ\)C increments. At each temperature point, the voltage will be swept across its ±10% range in 0.1 V increments. At each temperature/voltage combination, the EPUF will be challenged multiple times.

  3. 3.

    Response Regeneration and Analysis: The EPUF responses captured under these stress conditions will be compared against the golden profile to calculate the BER. Any discrepancies (errors) will be logged with their corresponding environmental parameters.

  4. 4.

    Data Visualization and Interpretation: The final analysis will involve plotting the BER as a function of both temperature and voltage. These empirical data will serve to either validate the 100% reliability claim of the EPUF or quantify the precise error rates, allowing for further refinement of the fuzzy extractor parameters.

The results of this hardware validation will provide a strong empirical basis for our claim of high EPUF reliability and offer critical insights into its performance under real-world operating conditions.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, H., Kim, S. An intelligent and adaptive security framework for UAV swarms: a cross-layer approach integrating highly reliable EPUF, DRL-based key management, and distributed ledger technology. Sci Rep (2026). https://doi.org/10.1038/s41598-026-46456-3

Download citation

  • Received: 21 September 2025

  • Accepted: 26 March 2026

  • Published: 09 April 2026

  • DOI: https://doi.org/10.1038/s41598-026-46456-3

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Unmanned aerial vehicle (UAV) swarm
  • Security
  • Physically unclonable function (PUF)
  • Deep reinforcement learning (DRL)
  • Blockchain
  • Formal verification
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com footer links

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics