{"id":"https://openalex.org/W4416924843","doi":"https://doi.org/10.1109/wimob66857.2025.11257543","title":"Enhancing UAV Communication Security Through HSM-Based Cryptographic Key Protection","display_name":"Enhancing UAV Communication Security Through HSM-Based Cryptographic Key Protection","publication_year":2025,"publication_date":"2025-10-20","ids":{"openalex":"https://openalex.org/W4416924843","doi":"https://doi.org/10.1109/wimob66857.2025.11257543"},"language":null,"primary_location":{"id":"doi:10.1109/wimob66857.2025.11257543","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116057072","display_name":"Salah Dine Maham","orcid":null},"institutions":[{"id":"https://openalex.org/I140494188","display_name":"Universit\u00e9 de Technologie de Troyes","ror":"https://ror.org/01qhqcj41","country_code":"FR","type":"education","lineage":["https://openalex.org/I140494188"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Salah Dine Maham","raw_affiliation_strings":["Universit&#x00E9; de Technologie de Troyes,Laboratoire Informatique et Soci&#x00E9;t&#x00E9; Num&#x00E9;rique (LIST3N),Troyes,France,10000"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Technologie de Troyes,Laboratoire Informatique et Soci&#x00E9;t&#x00E9; Num&#x00E9;rique (LIST3N),Troyes,France,10000","institution_ids":["https://openalex.org/I140494188"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104962716","display_name":"Guy Pujolle","orcid":"https://orcid.org/0000-0003-4147-7270"},"institutions":[{"id":"https://openalex.org/I4210159731","display_name":"Laboratoire de Recherche en Informatique de Paris 6","ror":"https://ror.org/05krcen59","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I39804081","https://openalex.org/I4210159245","https://openalex.org/I4210159731"]},{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Guy Pujolle","raw_affiliation_strings":["Sorbonne Universit&#x00E9;, CNRS,Laboratoire d&#x0027;informatique de Paris 6 (LIP6),Paris,France,75005"],"affiliations":[{"raw_affiliation_string":"Sorbonne Universit&#x00E9;, CNRS,Laboratoire d&#x0027;informatique de Paris 6 (LIP6),Paris,France,75005","institution_ids":["https://openalex.org/I39804081","https://openalex.org/I4210159731","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051214340","display_name":"Atiq Ahmed","orcid":"https://orcid.org/0000-0002-4789-9151"},"institutions":[{"id":"https://openalex.org/I140494188","display_name":"Universit\u00e9 de Technologie de Troyes","ror":"https://ror.org/01qhqcj41","country_code":"FR","type":"education","lineage":["https://openalex.org/I140494188"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Atiq Ahmed","raw_affiliation_strings":["Universit&#x00E9; de Technologie de Troyes,Laboratoire Informatique et Soci&#x00E9;t&#x00E9; Num&#x00E9;rique (LIST3N),Troyes,France,10000"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Technologie de Troyes,Laboratoire Informatique et Soci&#x00E9;t&#x00E9; Num&#x00E9;rique (LIST3N),Troyes,France,10000","institution_ids":["https://openalex.org/I140494188"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111456126","display_name":"Dominique Ga\u00efti","orcid":null},"institutions":[{"id":"https://openalex.org/I140494188","display_name":"Universit\u00e9 de Technologie de Troyes","ror":"https://ror.org/01qhqcj41","country_code":"FR","type":"education","lineage":["https://openalex.org/I140494188"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Dominique Gaiti","raw_affiliation_strings":["Universit&#x00E9; de Technologie de Troyes,Laboratoire Informatique et Soci&#x00E9;t&#x00E9; Num&#x00E9;rique (LIST3N),Troyes,France,10000"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Technologie de Troyes,Laboratoire Informatique et Soci&#x00E9;t&#x00E9; Num&#x00E9;rique (LIST3N),Troyes,France,10000","institution_ids":["https://openalex.org/I140494188"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5120627793","display_name":"Ali Remili","orcid":null},"institutions":[{"id":"https://openalex.org/I140494188","display_name":"Universit\u00e9 de Technologie de Troyes","ror":"https://ror.org/01qhqcj41","country_code":"FR","type":"education","lineage":["https://openalex.org/I140494188"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Ali Remili","raw_affiliation_strings":["Universit&#x00E9; de Technologie de Troyes,Laboratoire Informatique et Soci&#x00E9;t&#x00E9; Num&#x00E9;rique (LIST3N),Troyes,France,10000"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Technologie de Troyes,Laboratoire Informatique et Soci&#x00E9;t&#x00E9; Num&#x00E9;rique (LIST3N),Troyes,France,10000","institution_ids":["https://openalex.org/I140494188"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5116057072"],"corresponding_institution_ids":["https://openalex.org/I140494188"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.50818346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"77","last_page":"80"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.958899974822998,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.958899974822998,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.003100000089034438,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.7142999768257141},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6215999722480774},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5501999855041504},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5303999781608582},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.45010000467300415},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.4456999897956848},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.43389999866485596},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.3463999927043915}],"concepts":[{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.7142999768257141},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6215999722480774},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6137999892234802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6136000156402588},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5501999855041504},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5303999781608582},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.45010000467300415},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.4456999897956848},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.43389999866485596},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.3463999927043915},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3382999897003174},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.3287999927997589},{"id":"https://openalex.org/C61270487","wikidata":"https://www.wikidata.org/wiki/Q476843","display_name":"Interception","level":2,"score":0.3215999901294708},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.30570000410079956},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.29190000891685486},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.28189998865127563},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.26330000162124634},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.25929999351501465}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wimob66857.2025.11257543","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1921864689","https://openalex.org/W3116177770","https://openalex.org/W3133756494","https://openalex.org/W4320801506","https://openalex.org/W4327767936","https://openalex.org/W4391408674","https://openalex.org/W4406892572","https://openalex.org/W4406892643"],"related_works":[],"abstract_inverted_index":{"Unmanned":[0],"Aerial":[1],"Vehicles":[2],"(UAVs)":[3],"have":[4],"seen":[5],"extensive":[6],"growth":[7],"in":[8],"both":[9],"civilian":[10],"and":[11,21,58,79,105,113,120],"military":[12],"sectors,":[13],"driven":[14],"by":[15],"their":[16],"versatility,":[17],"ease":[18],"of":[19,24,38,70,122,134],"deployment,":[20],"expanding":[22],"range":[23],"applications.":[25],"However,":[26],"this":[27],"expansion":[28],"has":[29],"also":[30],"exposed":[31],"UAV":[32,135],"systems":[33],"to":[34,56,75,129],"a":[35,63],"growing":[36],"number":[37],"cybersecurity":[39],"threats.":[40],"The":[41],"MAVLink":[42],"protocol,":[43],"widely":[44],"adopted":[45],"for":[46],"UAV-ground":[47],"station":[48],"communication,":[49],"lacks":[50],"native":[51],"encryption,":[52],"making":[53],"it":[54],"susceptible":[55],"interception":[57],"manipulation.":[59],"This":[60],"paper":[61],"proposes":[62],"comprehensive":[64],"solution":[65],"based":[66],"on":[67],"the":[68,84,91,94,109,118,123,132],"use":[69],"Hardware":[71],"Security":[72],"Modules":[73],"(HSMs)":[74],"protect":[76],"cryptographic":[77],"keys":[78,100],"secure":[80],"data":[81],"transmission":[82],"using":[83],"ChaCha20":[85],"encryption":[86],"algorithm.":[87],"Our":[88],"approach":[89],"integrates":[90],"HSM":[92],"into":[93],"drone":[95],"system,":[96],"ensuring":[97],"that":[98,116],"sensitive":[99],"are":[101],"securely":[102],"generated,":[103],"stored,":[104],"accessed.":[106],"We":[107],"present":[108],"architecture,":[110],"implementation":[111],"details,":[112],"simulation":[114],"results":[115],"confirm":[117],"feasibility":[119],"efficiency":[121],"proposed":[124],"solution,":[125],"highlighting":[126],"its":[127],"potential":[128],"significantly":[130],"enhance":[131],"security":[133],"communications":[136],"with":[137],"minimal":[138],"performance":[139],"overhead.":[140]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-02T00:00:00"}
