TY - GEN
T1 - Instant Friend-or-Foe Identification for Stealth Devices in Coalition-Drone Swarms
AU - Lassfolk, Christina
AU - Kari, Hannu
N1 - Publisher Copyright:
© 2025 Curran Associates Inc.. All rights reserved.
PY - 2025
Y1 - 2025
N2 - The war in Ukraine demonstrates the versatility of drones in modern warfare. However, only the initial steps of this technological disruption are visible. The evolution will bring a shift from individually operated drones to swarms of drones. These swarms will operate semi- or fully autonomously, diminishing the role of human operators. Instead of real time operations, humans will set mission objectives and supervise operations. The complexity increases further as drones from diverse origins, with different capabilities, and with different levels of trust, collaborate in joint missions. This poses a challenging research question of how to identify, quickly and securely, other devices in a coalition mission featuring numerous autonomously operating units. This article introduces a novel mechanism for securely identifying autonomously operating drones on the battlefield without prior communication. Pre-deployment configuration enables autonomous decision-making in missions, eliminating the need to consult third parties during the identification process. This research focuses on a scenario where an ongoing mission that has suffered from equipment depletion necessitates replacement with new equipment. The present paper demonstrates how a valuable device can securely identify its neighbors before revealing its existence. A practical example of the benefits is the ability to conceal the precise location of the valuable device by utilizing low-cost, expendable civilian drones as message repeaters. The primary contribution of this paper is a solution that allows a device to operate in a stealthy mode and to distinguish friends and foes instantly and securely without prior encounters. The proposed concept of secure identification facilitates trust management in coalition drone swarms operating on the battlefield. Transparent use of data encryption is possible, but it is beyond the scope of this paper. Beyond flying drones, this solution is applicable to any autonomous or semi-autonomous system across various domains, as well as to human-carried devices that benefit from stealthy operation.
AB - The war in Ukraine demonstrates the versatility of drones in modern warfare. However, only the initial steps of this technological disruption are visible. The evolution will bring a shift from individually operated drones to swarms of drones. These swarms will operate semi- or fully autonomously, diminishing the role of human operators. Instead of real time operations, humans will set mission objectives and supervise operations. The complexity increases further as drones from diverse origins, with different capabilities, and with different levels of trust, collaborate in joint missions. This poses a challenging research question of how to identify, quickly and securely, other devices in a coalition mission featuring numerous autonomously operating units. This article introduces a novel mechanism for securely identifying autonomously operating drones on the battlefield without prior communication. Pre-deployment configuration enables autonomous decision-making in missions, eliminating the need to consult third parties during the identification process. This research focuses on a scenario where an ongoing mission that has suffered from equipment depletion necessitates replacement with new equipment. The present paper demonstrates how a valuable device can securely identify its neighbors before revealing its existence. A practical example of the benefits is the ability to conceal the precise location of the valuable device by utilizing low-cost, expendable civilian drones as message repeaters. The primary contribution of this paper is a solution that allows a device to operate in a stealthy mode and to distinguish friends and foes instantly and securely without prior encounters. The proposed concept of secure identification facilitates trust management in coalition drone swarms operating on the battlefield. Transparent use of data encryption is possible, but it is beyond the scope of this paper. Beyond flying drones, this solution is applicable to any autonomous or semi-autonomous system across various domains, as well as to human-carried devices that benefit from stealthy operation.
KW - Coalition
KW - Drones
KW - Friend-or-foe identification
KW - Identification
KW - Swarms
KW - Trust
UR - https://www.scopus.com/pages/publications/105014948084
U2 - 10.34190/eccws.24.1.3593
DO - 10.34190/eccws.24.1.3593
M3 - Conference article in proceedings
AN - SCOPUS:105014948084
T3 - European Conference on Information Warfare and Security, ECCWS
SP - 338
EP - 347
BT - Proceedings of the 24th European Conference on CyberWarfare and Security, ECCWS 2025
A2 - Lipps, Christoph
A2 - Han, Bin
PB - Academic Conferences and Publishing International
T2 - European Conference on Cyber Warfare and Security
Y2 - 26 June 2025 through 27 June 2025
ER -