eSIM-based authentication protocol for UAV remote identification

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

11 Scopus citations


This chapter addresses the authentic communication of drones' remote identification. First, it investigates the security of drones in the context of unmanned traffic management systems. This aspect is highly relevant for the controlled operation of commercial and civil drones today. Second, the chapter highlights relevant security attacks on or from drones and shows how a drone can be a target or a threat, respectively. The state-of-the-art in anti-drone technologies is then discussed including an overview of current detection, classification, and interdiction technologies. Next, the chapter provides an in-depth review of the remote identification technology for drones. For this, it highlights relevant regulations and standards. The core contribution of the chapter is an authentication protocol for the secure communication of remote identification. This protocol relies on using an embedded Subscriber Identification Module. A security analysis of the protocol is presented along with formal verification using ProVerif.

Original languageBritish English
Title of host publicationSecurity and Privacy in the Internet of Things
Subtitle of host publicationArchitectures, Techniques, and Applications
Number of pages32
ISBN (Electronic)9781119607755
ISBN (Print)9781119607748
StatePublished - 3 Dec 2021


  • Drone safety
  • Drone security
  • ESIM-based authentication protocol
  • UAV remote identification


Dive into the research topics of 'eSIM-based authentication protocol for UAV remote identification'. Together they form a unique fingerprint.

Cite this