A Secure & Tamper-Resistant Communication Framework for UAV Swarms with Blockchain-Based Logging
TIET Patiala | Dept. of CSE | March 2026
Mentor: Dr. Garima Singh, Assistant Professor
Arjun Singh
102317110
Priyanshu Patel
102303595
Arpita Verma
102303001
Bhumika Bandyopadhyay
102315167
Krrish Garg
102303698
System Architecture
UAV comms lack auth & encryption — vulnerable to attacks.
Crypto, detection & logging handled in isolation only.
Heavy solutions don't fit UAV-class hardware.
No mechanism to distinguish legitimate from rogue drones.
Existing systems lack tamper-proof audit trails.
Five integrated security layers in one real-time system.
Vulnerabilities documented. No integrated real-time protection exists.
NIST-standard ASCON — efficient authenticated encryption for constrained devices.
ECC gives equivalent security with 12× smaller keys — ideal for UAVs.
Each effective in isolation. None combined into a unified UAV pipeline.
No work unifies all five layers into one real-time system for UAV swarms.
UAV Attack Surface
ECC + ASCON/AES layer ensuring authenticity & confidentiality with minimal compute.
Lightweight ML flags rogue drones; dynamic trust isolates threats in real time.
Private blockchain with async batching ensures integrity & traceability.
All modules unified into one modular, real-time-capable system.
Assumptions
Constraints
NIST-standardised for constrained devices. Authenticated encryption in one pass — lower energy than AES-GCM.
256-bit ECC equals 3072-bit RSA security with 12× smaller keys — critical for UAV memory limits.
Unsupervised ML — detects anomalies without labelled data. Low memory footprint for UAV hardware.
Permissioned chain avoids public-network latency. Async batching keeps writes off the critical path.
Raspberry Pi 4 and ESP32 modules for physical validation. Software simulation is the primary deliverable.
ECC + ASCON/AES ensuring confidentiality, authentication, and real-time performance on constrained hardware.
ML pipeline scoring drones dynamically; rogue & compromised nodes isolated without disrupting the swarm.
Async batched private chain — tamper-proof, traceable records of all events including attacks.
Full attack-scenario validation (replay, rogue drone, command injection) + real-time monitoring UI.
ECC key exchange; ASCON/AES encryption module; inter-drone authentication protocol.
Private blockchain; async queue logging; SHA-256 block structure; batching optimisation.
Isolation Forest anomaly pipeline; trust score algorithm; malicious node isolation logic.
Simulation QA; attack scenario scripting (replay, rogue, cmd injection); UI validation.
React dashboard; real-time trust visualisation; swarm topology display; health monitoring.
Niyonsaba & Konate — Semantic Scholar. Spoofing & replay vulnerabilities in UAV networks.
IEEE Xplore, doc. 10329156. Security & privacy in Flying Ad Hoc Networks.
nist.gov. ASCON selected as lightweight cryptography standard for constrained devices.
IJNS Vol. 20, No. 4, pp. 625–635. ECC equivalent security with 12× smaller keys.
MDPI Electronics 10(13). Machine learning enabled IDS for UAV network security.
ResearchGate, pub. 381793815. Trust-based flying ad-hoc network security analysis.
IEEE Xplore, doc. 10855475. Blockchain-based security architecture for UAV systems.
TACS KPI, article 326898. Comparative analysis of lightweight cryptography in UAV systems.
SentinelMesh | CPG No. 187 | TIET Patiala, March 2026
Thank you. Questions are welcome.