Enhancing_Communication_Security_in_Drones_Using_Q
Enhancing_Communication_Security_in_Drones_Using_Q
Abstract: This paper presents a novel approach to enhancing the security and reliability of drone
communications through the integration of Quantum Random Number Generators (QRNG) in
Frequency Hopping Spread Spectrum (FHSS) systems. We propose a multi-drone framework that
leverages QRNG technology to generate truly random frequency hopping sequences, significantly
improving resistance against jamming and interception attempts. Our method introduces a concur-
rent access protocol for multiple drones to share a QRNG device efficiently, incorporating robust
error handling and a shared memory system for random number distribution. The implementa-
tion includes secure communication protocols, ensuring data integrity and confidentiality through
encryption and Hash-based Message Authentication Code (HMAC) verification. We demonstrate
the system’s effectiveness through comprehensive simulations and statistical analyses, including
spectral density, frequency distribution, and autocorrelation studies of the generated frequency
sequences. The results show a significant enhancement in the unpredictability and uniformity of
Citation: de Curtò, J.; de Zarzà, I.; frequency distributions compared to traditional pseudo-random number generator-based approaches.
Cano, J.-C.; Calafate, C.T. Enhancing Specifically, the frequency distributions of the drones exhibited a relatively uniform spread across
Communication Security in Drones the available spectrum, with minimal discernible patterns in the frequency sequences, indicating
Using QRNG in Frequency Hopping high unpredictability. Autocorrelation analyses revealed a sharp peak at zero lag and linear decrease
Spread Spectrum. Future Internet 2024, to zero values for other lags, confirming a general absence of periodicity or predictability in the
16, 412. https://doi.org/10.3390/
sequences, which enhances resistance to predictive attacks. Spectral analysis confirmed a relatively
fi16110412
flat power spectral density across frequencies, characteristic of truly random sequences, thereby
Academic Editor: Paolo Bellavista minimizing vulnerabilities to spectral-based jamming. Statistical tests, including Chi-squared and
Kolmogorov-Smirnov, further confirm the unpredictability of the frequency sequences generated by
Received: 8 October 2024
Revised: 31 October 2024
QRNG, supporting enhanced security measures against predictive attacks. While some short-term
Accepted: 6 November 2024 correlations were observed, suggesting areas for improvement in QRNG technology, the overall
Published: 8 November 2024 findings confirm the potential of QRNG-based FHSS systems in significantly improving the security
and reliability of drone communications. This work contributes to the growing field of quantum-
enhanced wireless communications, offering substantial advancements in security and reliability for
drone operations. The proposed system has potential applications in military, emergency response,
Copyright: © 2024 by the authors.
and secure commercial drone operations, where enhanced communication security is paramount.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
Keywords: frequency hopping spread spectrum (FHSS); quantum random number generator
distributed under the terms and
(QRNG); random processing units; quantum computing; drone communications; quantum enhanced
conditions of the Creative Commons
Attribution (CC BY) license (https://
communications
creativecommons.org/licenses/by/
4.0/).
1. Introduction
In an increasingly digital and interconnected world, and with the advent of sophisti-
cated AI techniques [1], the need for secure communication channels has never been more
critical. Sensitive information, whether personal, corporate, or governmental, must be
protected against a myriad of threats including eavesdropping, data interception, and delib-
erate jamming. Frequency Hopping Spread Spectrum (FHSS) [2,3] has long been employed
as a technique to enhance the security and robustness of wireless communications.
The ever-increasing demand for secure communication channels has led to the ex-
ploration of advanced techniques that can withstand interception and jamming attempts.
Frequency Hopping Spread Spectrum (FHSS) is a well-established method to enhance
communication security. This article explores the potential of using a Randomness Pro-
cessing Unit (RPU) to generate true random sequences for frequency hopping, thereby
significantly enhancing the unpredictability and robustness of communication systems. By
rapidly changing the carrier frequency according to a specific sequence, FHSS spreads the
signal over a wide spectrum, making it more resistant to interference and more difficult
to intercept.
Traditionally, the sequences used for frequency hopping are generated using pseudo-
random number generators (PRNGs). While these sequences can appear random, they are
ultimately deterministic and, given enough time and resources, can potentially be predicted
or reverse-engineered. This inherent vulnerability poses a significant risk to communication
systems, especially in environments where security is paramount. Improvements over
traditional PRNGs [4–6] have been explored in the literature, with emphasis on an efficient
implementation and portability.
The advent of Randomness Processing Units (RPUs) [7,8] offers a promising solution
to this challenge. RPUs are specialized hardware devices capable of generating true random
numbers based on inherently unpredictable physical processes, such as quantum noise or
thermal fluctuations. Unlike PRNGs, the numbers generated by RPUs are not reproducible
or predictable, even with complete knowledge of the system’s internal workings.
This manuscript explores the concept of leveraging RPUs to generate true random
sequences [9,10] for frequency hopping in communication systems. By replacing deter-
ministic sequences with truly random ones, we can significantly enhance the security
and robustness of FHSS. We will study the theoretical background of FHSS, the math-
ematical formulation of true random frequency hopping, and the security benefits and
implementation challenges associated with this approach. A preliminary use case with an
actual QRNG device setup in a multi-drone configuration is presented. This exploration
aims to highlight the importance of incorporating true randomness in securing modern
communication infrastructures.
The paper is organized as follows: Section 2 provides an overview and related works
while Section 3 provides the theoretical background and considerations for Frequency
Hopping Spread Spectrum (FHSS) and the use of Randomness Processing Units (RPUs). In
Section 4, we present our methodology for integrating an RPU to generate truly random
frequency hopping sequences, enhancing the security of FHSS systems. Section 5 details the
implementation aspects, including the setup of the RPU, generation and synchronization of
frequency hopping sequences, and security protocols. In Section 6, we apply the proposed
method to a drone cloud with a ring topology, demonstrating its benefits in multi-drone
communications. Section 7 presents the evaluations, including experimental setup, proce-
dures, and results that demonstrate the effectiveness of our approach. Section 8 explores
practical applications and potential future developments of the system. Finally, Section 9
concludes the paper and outlines future research directions.
2. Related Works
Frequency Hopping Spread Spectrum (FHSS) has long been recognized as a robust
method for secure wireless communications due to its resistance to interference and eaves-
dropping. The concept of FHSS was first patented by Lamarr and Antheil [11], where
Future Internet 2024, 16, 412 3 of 33
the carrier frequency is rapidly switched according to a specific sequence known only to
the communicating parties. Traditional FHSS systems utilize Pseudo-Random Number
Generators (PRNGs) to create these hopping sequences. While PRNGs are computation-
ally efficient, they are inherently deterministic, making them susceptible to prediction and
reverse engineering if an adversary intercepts sufficient portions of the communication [12].
The limitations of PRNGs in security-critical applications have spurred interest in True
Random Number Generators (TRNGs) and, more recently, Quantum Random Number
Generators (QRNGs). QRNGs exploit fundamental quantum mechanical processes, such
as quantum vacuum fluctuations and photon emission events, to produce truly random
numbers that are inherently unpredictable [13]. Jennewein et al. [14] demonstrated an
early implementation of a QRNG using photon polarization measurements, providing a
significant enhancement in randomness over classical TRNGs.
In the context of cryptographic systems, secure key distribution and encryption are
paramount. The RSA algorithm [15], developed by Rivest, Shamir, and Adleman, revo-
lutionized public-key cryptography by utilizing the computational difficulty of factoring
large composite numbers. RSA allows for secure key exchange over unsecured channels,
which is essential for initializing secure communications. However, RSA’s security relies
on key lengths that may be computationally intensive for resource-constrained devices.
Elliptic Curve Cryptography (ECC) [16,17] offers similar security levels to RSA but
with smaller key sizes, making it more suitable for devices with limited computational
resources, such as drones and IoT devices. ECC’s efficiency stems from the mathematical
complexity of the elliptic curve discrete logarithm problem, which remains intractable for
sufficiently large key sizes.
For symmetric encryption, the Advanced Encryption Standard (AES) [18] has become
the industry standard due to its balance of security and performance. AES is employed
for encrypting data streams after the initial key exchange, ensuring confidentiality and
integrity during communication sessions. The combination of public-key cryptography for
key exchange (RSA or ECC) and symmetric encryption (AES) provides a robust framework
for secure communications.
Recent advancements in integrating QRNGs into communication systems have shown
promise in enhancing security. Abellán et al. [19] utilized quantum phase fluctuations in a
laser diode to generate high-speed random numbers suitable for cryptographic applications.
Such QRNGs can be integrated into FHSS systems to produce truly random hopping
sequences, significantly increasing the difficulty for adversaries attempting to predict or
jam the communication.
In the field of drone communications, security is a critical concern due to the increasing
reliance on unmanned aerial vehicles (UAVs) for military, commercial, and civilian appli-
cations. Existing research has explored various aspects of secure drone communications,
including secure routing protocols [20], intrusion detection systems [21], and encryption
schemes tailored for UAV networks [22]. However, the application of QRNG-based FHSS
in drone networks remains relatively unexplored.
Frequency hopping in wireless communication systems, while providing security
and robustness against interference and eavesdropping, introduces challenges related to
scheduling and potential interruption of connections. Efficient scheduling is crucial to
ensure seamless communication, especially in dynamic networks such as multi-hop UAV
systems [23] and IoT Networks [24].
Our work builds upon these foundational studies by integrating QRNGs into FHSS
systems specifically for multi-drone networks. By employing secure key exchange mecha-
nisms such as RSA or ECC for the initial distribution of synchronization information and
AES for encrypting the frequency hopping sequences, we address the challenges associ-
ated with synchronization and security in true random FHSS systems. This integration
enhances the unpredictability of the hopping sequences and provides a robust defense
against jamming and interception attempts.
Future Internet 2024, 16, 412 4 of 33
where:
• Ao is the amplitude of the signal during the o-th hop,
• f o is the carrier frequency for the o-th time interval,
• ϕo is the phase for the o-th time interval,
• 1[to ,to+1 ) (t) is an indicator function that is 1 if t ∈ [to , to+1 ) and 0 otherwise,
• to and to+1 are the start and end times of the o-th hop, respectively,
• N is the total number of frequency hops.
Ro
f o = f min + ( f max − f min ) (3)
Rmax
where:
• Ro is the true random number for the o-th hop,
• Rmax is the maximum value that Ro can take.
The entropy H of the true random sequence { Ro } is given by:
H = − ∑ P( Ro ) log P( Ro ) (4)
o
1
In the case of uniformly distributed random numbers, P( Ro ) = Rmax for all o, lead-
ing to:
Start
Synchronize
Transmitter and Receiver
Begin FHSS
Communication
End
Figure 1. Flowchart of the frequency hopping sequence generation and synchronization process.
The primary security advantage of using RPUs lies in the true randomness of the
generated sequences. Even if an adversary has access to the transmitted signal, they
cannot predict future frequency hops without direct access to the RPU or the shared
random sequence. This feature significantly enhances the robustness of the system against
interception and jamming.
For a system using true random FHSS, the PSD is expected to be flat across the hopping
band, indicating uniform distribution of signal power.
This detailed mathematical foundation underscores the robustness and security advan-
tages of using true random sequences for frequency hopping, as opposed to deterministic
or pseudo-random sequences. The next sections will delve into the security analysis and
practical considerations for implementing such a system.
(1) Randomness
(2) True Random
Processing Unit (3) FHSS Modulator (4) Transmitter
Frequency Sequence
(RPU)
Wireless Channel
Figure 2. Diagram illustrating the methodology of using a Randomness Processing Unit (RPU) for
true random frequency hopping in an FHSS system.
using pseudo-random number generators (PRNGs), which, while complex, are ultimately
deterministic and potentially predictable [27,28].
Next, we provide a detailed explanation of how each component interacts and the
data flow between them.
1. Randomness Processing Unit (RPU): The RPU generates a stream of true random
numbers by exploiting inherent physical phenomena such as quantum noise or ther-
mal fluctuations. These random numbers form the basis of the frequency hopping
sequence and are critical for ensuring unpredictability in the system.
2. True Random Frequency Sequence Generator: The random numbers produced by the
RPU are processed to generate a sequence of frequencies { f o }. This involves mapping
the random numbers to specific frequencies within the available frequency band F.
The mapping ensures a uniform probability distribution over F, maximizing entropy.
The frequency sequence generator interfaces directly with the RPU to receive the
random numbers and with the FHSS modulator to provide the frequency sequence.
3. FHSS Modulator: The FHSS modulator receives the true random frequency sequence
from the frequency sequence generator. It modulates the carrier signal according
to the frequency f o specified for each time interval [to , to+1 ). The modulator also
incorporates the data to be transmitted, applying appropriate modulation techniques
(e.g., frequency shift keying or phase shift keying). The modulated signal is then
passed to the transmitter.
4. Transmitter: The transmitter amplifies the modulated signal and broadcasts it over
the wireless channel. It ensures that the signal conforms to regulatory standards for
transmission power and spectral occupancy. The transmitter interfaces with the FHSS
modulator for input and communicates over the wireless channel to the receiver.
5. Receiver: On the receiving end, the receiver captures the signal from the wireless
channel. It must be synchronized with the transmitter to correctly follow the frequency
hopping sequence. The receiver demodulates the signal using the same frequency
sequence { f o }, extracting the transmitted data. The receiver interfaces with the
synchronization mechanism to maintain alignment with the transmitter’s frequency
hopping pattern.
6. Synchronization Mechanism: The synchronization mechanism is critical for main-
taining alignment between the transmitter and receiver. It ensures that both ends
use the same frequency f o at any given time t. Synchronization information, such
as initial timing parameters and any required updates, is communicated through a
secure channel or embedded within the communication protocol. The synchronization
mechanism interfaces with both the frequency sequence generator (to obtain or verify
the frequency sequence) and the receiver (to adjust timing and sequence alignment).
7. Secure Key Distribution: The secure key distribution component facilitates the ex-
change of keys or synchronization information necessary for secure communication. It
interfaces with the synchronization mechanism to provide the required cryptographic
keys or parameters. Secure channels, possibly using public-key cryptography, are
employed to prevent interception or tampering during key exchange.
The data flow begins with the RPU generating true random numbers, which are
converted into a frequency sequence by the frequency sequence generator. This sequence
is fed into the FHSS modulator, along with the data to be transmitted. The FHSS modu-
lator outputs a frequency-hopped, modulated signal to the transmitter. The transmitter
broadcasts the signal over the wireless channel to the receiver. The receiver, synchronized
via the synchronization mechanism, captures and demodulates the signal using the same
frequency sequence to retrieve the data. Throughout this process, the synchronization
mechanism and secure key distribution ensure that both ends maintain alignment and that
the communication remains secure. Implementing dynamic control architectures and ro-
bust communication protocols is essential for swarm unmanned aerial vehicles to function
effectively [29].
Future Internet 2024, 16, 412 8 of 33
Let S(t) represent the transmitted signal. In a traditional FHSS system, the carrier
frequency at time t is determined by a sequence { f o }, where o = 1, 2, . . . , N and N is the
total number of hops in the sequence. The frequency-hopped signal can be expressed as:
N
S(t) = ∑ Ao cos(2π f o t + ϕo ) · 1[to ,to+1 ) (t)
o =1
.
Here, Ao represents the amplitude, ϕo the phase, and 1[to ,to+1 ) (t) is an indicator func-
tion defining the time interval for each hop.
This high entropy ensures that even with complete knowledge of the hopping algo-
rithm, an adversary cannot predict the sequence, as it is truly random.
The primary security advantage of true random frequency hopping lies in its anti-
jamming capabilities. Given that the sequence is entirely unpredictable, a jammer must
either cover the entire bandwidth (which requires considerable power) or fail to disrupt the
communication. The jamming margin, defined as the difference between the bandwidth of
the spread spectrum and the jamming bandwidth, is maximized.
The security of the system is further enhanced because eavesdroppers cannot anticipate
the next frequency hop. The information-theoretic security provided by the truly random
sequence means that even with infinite computational power, an adversary cannot predict
future hops without the actual random sequence.
The primary challenge with true random FHSS is synchronization between the trans-
mitter and receiver. Both ends must be perfectly synchronized in terms of the hopping
sequence. This can be achieved through secure key distribution mechanisms or synchro-
nization protocols.
The true random sequence or the seed value for the RPU must be securely shared
between the communicating parties. This can be done using public-key cryptography or
other secure channels.
The implementation of our RPU-based FHSS system presents both challenges and
opportunities for enhancing communication security. One key consideration is the rate
at which the RPU can generate random numbers, as this directly impacts the frequency
hopping rate and, consequently, the system’s resilience to jamming attempts. To address
potential latency issues, we employ a buffer system that pre-generates a pool of random
frequencies, ensuring a continuous supply for rapid hopping. Additionally, we implement
a dynamic hopping rate that adapts to the perceived threat level; under normal conditions,
the system may use a moderate hopping rate to conserve power, but it can switch to a more
aggressive rate when jamming or interception is suspected. The RPU’s true randomness
also allows for the implementation of a frequency exclusion list, dynamically avoiding
frequencies that are detected to be under interference, without compromising the unpre-
dictability of the overall sequence. This adaptive approach, coupled with the inherent
unpredictability of the RPU, provides a significant advantage over traditional PRNG-based
systems in terms of security and flexibility.
Future Internet 2024, 16, 412 9 of 33
To clarify the operation of the Threat Detection Algorithm and address concerns about
how often the system updates its threat assessment and adjusts the frequency hopping rate,
we provide additional details on the timing and responsiveness of the mechanism.
The Threat Detection Algorithm can operate continuously during active communica-
tion, monitoring key communication metrics such as Bit Error Rate (BER), Signal-to-Noise
Ratio (SNR), and Received Signal Strength Indicator (RSSI). The assessment of these metrics
occurs at regular intervals defined by the system’s monitoring frequency f monitor , which
can be configured based on the specific requirements and capabilities of the system. In
high-security environments, f monitor can be set to evaluate metrics every hop interval,
allowing the system to detect threats and respond in real-time.
Upon detecting that any monitored metric exceeds its predefined threshold, indicating
a potential attack or interference, the system increases the frequency hopping rate Rh by
a step size ∆R. The adjustment is immediate and can occur within a single hop interval,
enabling the system to respond swiftly to threats. The time it takes to adjust from the
minimum hopping rate Rhmin to the maximum hopping rate Rhmax depends on the value
of ∆R and the frequency of metric assessments. For example, if ∆R is set such that Rh
increases by a fixed percentage or value each time a threat is detected, and assessments
occur every hop, the total time Tadjust to reach Rhmax is:
Rhmax − Rhcurrent
Tadjust = × Thop (10)
∆R
where Rhcurrent is the current hopping rate at the time of the first threat detection, and
Thop = R1 is the duration of each hop.
h
To prevent rapid oscillations of the hopping rate due to transient fluctuations or
false positives, the system may incorporate hysteresis or require that the thresholds be
exceeded for a certain number of consecutive assessments before adjusting Rh . Additionally,
when the threat subsides—indicated by metrics returning below threshold levels—the
system decreases Rh gradually to conserve resources, ensuring a balance between security
and efficiency.
In our current implementation, the dynamic adjustment of Rh in response to detected
threats is conceptual and serves to illustrate how the methodology could be applied in
real-world scenarios. We consider the integration of real-time threat detection and hopping
rate adjustment to be feasible with appropriate hardware and software optimizations.
Implementing this functionality would involve configuring the monitoring frequency
f monitor , defining appropriate thresholds for the metrics, and determining suitable values
for ∆R based on the system’s performance requirements and operational environment.
T = R × (1 − Pe ) (14)
where:
• R is the raw data rate (bits per second),
• Pe is the bit error rate (BER).
The raw data rate R depends on the bandwidth B and the spectral efficiency η (mea-
sured in bits per second per Hertz):
Future Internet 2024, 16, 412 13 of 33
R = B×η (15)
In the context of our FHSS system with true random frequency hopping, the hopping
rate Rh can impact the effective data rate due to factors such as the time required for
frequency switching and synchronization overhead. The effective data rate Reff can be
adjusted to account for these factors:
!
tswitch + tsync
Reff = R × 1 − (16)
Thop
where:
• tswitch is the time taken to switch frequencies,
• tsync is the time spent on synchronization during each hop,
• Thop is the duration of each hop (i.e., Thop = R1 ).
h
The throughput then becomes:
T = Reff × (1 − Pe ) (17)
This formulation acknowledges that while latency affects the timing of data delivery,
throughput is primarily determined by the data rate and the error performance of the
system. High latency does not necessarily reduce the throughput but can impact the overall
system performance in terms of delay-sensitive applications.
It is important to understand that in practical FHSS systems, certain physical and
protocol-level factors can introduce delays during frequency hopping.
Firstly, although the transmitter and receiver are synchronized in terms of timing
and frequency hopping sequence, the actual process of switching frequencies involves
hardware components that require a finite amount of time to change from one frequency
to another. This time is known as the frequency switching time tswitch , and it can vary
depending on the specific hardware used in the system. During this switching period,
the transmitter and receiver may not be able to send or receive data, resulting in a brief
interruption in communication.
Secondly, maintaining synchronization often involves the exchange of synchronization
signals or the execution of synchronization algorithms, which consume processing time
tsync . Even with precise synchronization, periodic adjustments and computations are
necessary to compensate for clock drift and other factors, introducing processing delays.
Therefore, the total effective time available for data transmission during each hop is
reduced by the sum of tswitch and tsync . This reduction in available transmission time per
hop effectively decreases the data rate, which is why we adjust the effective data rate Reff
to account for these factors in the throughput model.
Including tswitch and tsync in the calculations allows for a more accurate representation
of the system’s performance, especially when considering high hopping rates Rh . As Rh
increases (i.e., the duration of each hop Thop decreases), the proportion of time spent on
frequency switching and synchronization relative to the total hop duration becomes more
significant, potentially impacting the overall throughput.
In practical implementations, the latency and throughput models are primarily utilized
during the design, configuration, and optimization phases of the FHSS system. These
models help in predicting system performance under various operating conditions and in
making informed decisions about parameter settings such as hopping rate Rh , bandwidth
B, and modulation schemes.
During active communication, the system may not need to run these calculations
continuously. Instead, they can be computed periodically or when there is a significant
change in system parameters or operating conditions. For example, if the system detects
a change in the bit error rate Pe due to interference or other environmental factors, it
may recalculate the effective data rate Reff and throughput T to assess the impact on
Future Internet 2024, 16, 412 14 of 33
where Eb is the energy per bit, N0 is the noise power spectral density, and Q(·) is the
Q-function.
Frequency hopping spreads the signal over multiple frequencies, effectively reducing
N0 and improving Pb .
5. Implementation
To implement true random frequency hopping in communication systems, several
critical components and processes must be established. This section describes the practical
implementation, including the setup of the Randomness Processing Unit (RPU), the gen-
eration and synchronization of frequency hopping sequences, and the security protocols
necessary to maintain the integrity and confidentiality of the communication.
Ro
f o = f min + ( f max − f min )
Rmax
where Rmax is the maximum possible output of the RPU. This mapping ensures that the
frequencies are chosen randomly and uniformly over the band.
A critical challenge in FHSS systems, especially when using true random frequency
hopping sequences, is maintaining synchronization between the transmitter and receiver.
Unlike traditional FHSS systems that use pseudo-random number generators (PRNGs)
with shared seeds, our system relies on sequences that are inherently unpredictable and
cannot be reproduced by generating devices independently. Therefore, both the transmitter
and receiver must have access to the same sequence of random numbers or be able to
generate them in a synchronized manner.
To achieve secure and reliable synchronization in our system, we implement a two-
stage process involving public-key cryptography and symmetric key encryption:
• Initial Synchronization and Key Agreement: At the start of communication, the
transmitter and receiver engage in a secure key exchange protocol using public-key
cryptography, such as RSA or Elliptic Curve Cryptography (ECC). This allows them
to securely agree upon a symmetric key without exposing it to potential eavesdroppers.
The symmetric key established during this phase is used for encrypting subsequent
communications, including the true random sequence and synchronization information.
• Secure Distribution of Random Sequences: With the symmetric key in place, the
transmitter securely transmits the necessary synchronization information and the
initial segment of the true random frequency hopping sequence to the receiver. This
information is encrypted using the symmetric key, ensuring that only authorized
parties with the corresponding key can decrypt and access the sequence. The use of a
symmetric key for encryption at this stage is crucial because symmetric algorithms like
Advanced Encryption Standard (AES) are more efficient for handling larger amounts
of data in real-time communication compared to public-key algorithms.
Once the initial synchronization is achieved, both parties use the shared true random se-
quence for frequency hopping. To maintain synchronization over time, the system incorporates:
• Periodic Resynchronization: Due to potential clock drift or communication delays,
periodic resynchronization is necessary. The transmitter periodically sends encrypted
synchronization beacons or timestamps using the established symmetric key. This
allows the receiver to adjust its timing and ensures continuous alignment with the
transmitter’s hopping sequence.
• Dynamic Key Updating: To enhance security, the symmetric key used for encryp-
tion can be updated periodically using key derivation functions or additional key
exchange protocols. This reduces the risk of key compromise over extended periods
and mitigates potential replay or interception attacks.
• Robust Error Handling: The synchronization protocol includes mechanisms for error
detection and correction to handle data loss or corruption due to channel impairments
or malicious interference. This ensures that synchronization integrity is maintained
even in adverse conditions.
Future Internet 2024, 16, 412 16 of 33
That is, to achieve secure and reliable synchronization in our system, we implement
a two-stage process involving public-key cryptography and symmetric key encryption.
Initially, the transmitter and receiver engage in a secure key exchange protocol using
public-key cryptography to establish a symmetric key without exposing it to potential
eavesdroppers. With the symmetric key in place, the transmitter securely transmits the nec-
essary synchronization information and the initial segment of the true random frequency
hopping sequence to the receiver using symmetric encryption. Once the initial synchroniza-
tion is achieved, both parties use the shared true random sequence for frequency hopping.
To maintain synchronization over time, the system incorporates periodic resynchroniza-
tion, dynamic key updating, and robust error handling mechanisms, ensuring continuous
alignment and enhanced security.
By integrating public-key cryptography for initial key agreement and symmetric
key encryption for ongoing secure communication, our system effectively combines the
strengths of both cryptographic approaches. Public-key cryptography facilitates secure key
exchange without prior shared secrets, while symmetric key encryption offers efficiency for
real-time data protection.
It is important to note that while the use of public-key cryptography to establish a
symmetric key is a standard practice, the unique aspect of our system lies in the secure
distribution and synchronization of true random frequency hopping sequences. Unlike
PRNG-based systems where the receiver can independently generate the same sequence us-
ing a shared seed, our approach requires careful management of the true random sequences.
The encrypted transmission of these sequences ensures that they remain confidential and
that only authorized receivers who possess the correct symmetric key can participate in the
communication. This adds a layer of security, making it significantly more challenging for
adversaries to predict or intercept the frequency hopping pattern.
FHSS Link
Drone 1 Drone 2
Drone 4 Drone 3
FHSS Link
Figure 3. Diagram of the drone cloud with ring topology implementing FHSS with true random
frequency hopping.
Given the potential for clock drift or other synchronization issues, drones periodically
resynchronize their frequency hopping sequences. This can be achieved through a resynchro-
nization protocol, possibly using reserved channels or a periodic synchronization beacon.
While it is true that an initial secure and reliable channel is used for exchanging
keys and synchronization data between drones, the primary purpose of this channel is to
establish the parameters necessary for secure communication. However, relying solely on
this channel for all communication would expose the system to vulnerabilities associated
with fixed-frequency transmissions, such as jamming, interception, and eavesdropping.
The use of Frequency Hopping Spread Spectrum (FHSS) for the main communication
channel offers several critical advantages:
• Resistance to Jamming: FHSS systems are inherently resistant to jamming attacks
because the frequency changes rapidly in a pattern known only to the communicating
parties. An adversary attempting to jam the communication would need to jam all
possible frequencies simultaneously, which is often impractical.
• Enhanced Security: By hopping frequencies in a true random sequence, the com-
munication becomes extremely difficult to predict or intercept without knowledge
of the hopping pattern. This significantly reduces the risk of eavesdropping and
unauthorized access.
• Interference Mitigation: FHSS helps in mitigating interference from other devices
operating in the same frequency band. Since the communication frequency changes
rapidly, the impact of any interference on a particular frequency is minimized.
• Robustness in Adverse Environments: Drones often operate in environments where
the communication channel conditions can vary rapidly due to movement, obstacles,
or other factors. FHSS provides robustness against such variations, maintaining
reliable communication.
• Scalability: In a network of multiple drones, FHSS allows for better spectrum uti-
lization and reduces the likelihood of collisions, as different pairs can use different
hopping patterns.
The initial secure channel is typically a narrowband communication link used specif-
ically for key exchange and synchronization due to its simplicity and lower resource
requirements. It is not designed to handle the bandwidth and security requirements of
continuous drone communication, especially in hostile or dynamic environments. By
transitioning to an FHSS-based communication channel after the initial setup, the system
leverages the benefits of spread spectrum techniques to enhance overall communication
security and reliability.
Therefore, while the initial secure channel is essential for setting up communication
parameters, the use of FHSS for ongoing communication is critical for protecting against
threats and ensuring the robustness of the drone network in real-world operating conditions.
Given the above, the total complexity for frequency hopping across T time intervals in
a network of N drones is approximately:
O( T · (1 + log | F |) + N ) = O( T log | F | + N )
This represents a relatively low complexity, making the QRNG-based FHSS efficient
for real-time operation even in dense drone networks.
7. Evaluations
The primary objective of our experimentation was to evaluate the effectiveness and
security of using true random frequency hopping in a simulated drone network with a ring
topology. The setup included the following key components:
• QRNG Device or RPU: A Quside QRNG device [9,31] installed in the internal network
of the BARCELONA Supercomputing Centre Facility was utilized to generate true
random numbers, which were used to create the frequency hopping sequences. The
device is a QRNG Module ETH based on the FMC 400 Randomness Module by Quside.
• Drones: Each drone in the network was a simulated entity capable of implementing
frequency hopping based on the generated sequences.
• Secure Communication Protocol: A secure communication protocol was developed,
incorporating AES encryption, Hash-based message authentication code (HMAC) for
data integrity, and secure key exchange mechanisms.
• Synchronization Mechanism: Synchronization between drones was achieved using a
preset time, that in practice would correspond to GPS, ensuring a common start time
for frequency hopping across all nodes.
The QRNG Module ETH, see Figure 4, is based on the FMC 400 Randomness Module
by Quside. It includes an FPGA baseboard to provide high-quality and fast random bit
rates through a 1Gb-Ethernet connection.
The QRNG Module ETH employs a digital quantum entropy source based on the
accelerated phase diffusion process in semiconductor lasers. The system comprises:
• Laser: Produces a stream of phase-randomized optical pulses.
• Unbalanced MACH-ZEHNDER Interferometer: Converts random phases into ran-
dom amplitudes.
• Photodetector: Translates the optical signal into an electrical signal.
• Digitizer: Converts the analog signal into a digital bit stream.
• Control and Clocks: Manages the digital control, health monitoring, and random-
ness extraction.
Figure 4. Reference front panel for the QRNG Module ETH powered by the FMC 400 quantum
entropy source by Quside.
• RJ-45 Connection (Front Panel): Connects the QRNG Module ETH to the PC for
control, monitoring, and data transfer.
• ON/OFF Switch (Front Panel): Powers the device on or off. The system restarts with
default settings when switched on.
• Power Plug (Rear Panel): Connects to a 110/240 VAC power source.
• Status LED (Front Panel): Indicates the system status.
Future Internet 2024, 16, 412 20 of 33
This device leverages the inherent quantum phase noise of lasers to generate true
random numbers, providing a raw bit rate of up to 1 Gbit/s with strong entropy character-
istics. The phase diffusion technique involves modulating a semiconductor laser to produce
a stream of phase-randomized optical pulses, which are then converted into amplitude
fluctuations using an interferometer [32–34]. These fluctuations are detected and digitized
to produce high-quality random bit streams suitable for cryptographic applications and
secure communications.
7.1. Procedure
The experimentation procedure consisted of several stages:
The QRNG device generated true random numbers, which were converted into a
series of frequency values within a specified range. This sequence determined the order of
frequency changes for each communication link in the drone network.
To establish a secure communication channel, a shared key was exchanged between
the drones using a secure key exchange protocol. This key was used for both encrypting
the frequency sequence and generating HMACs for integrity verification.
All drones synchronized their internal clocks to a common preset time, which in
practice would correspond to a GPS-based time reference. An agreed-upon start time
was set, and all drones commenced frequency hopping simultaneously, adhering to the
pre-generated sequence.
During the simulation, each drone entity transmitted data packets over the network.
Here each drone is an instantation entity of its correspondent class in python. The data,
including the frequency sequence and synchronization information, was encrypted using
AES. HMACs were generated and attached to each packet to ensure data integrity.
The experiment’s performance was monitored in real-time, where the code in python
simulated a drone ring topology, and the QRNG was accessed through a lock mechanism
in the internal VPN of the BARCELONA Supercomputing Center. We focused on synchro-
nization accuracy, data integrity, and resistance to potential interception or jamming. The
frequency hopping sequence and synchronization data were logged for subsequent analysis.
Drone 1
FHSS System
Drone 3
FHSS System
Concurrent Access
Protocol
Manages access to QRNG
Figure 5. Diagram illustrating the methodology of using a QRNG for true random frequency hopping
in a multi-drone FHSS system. The QRNG generates truly random numbers, which are distributed to
multiple drones through a shared memory system. A concurrent access protocol manages access to
the QRNG, ensuring efficient use of the device. Each drone implements its own FHSS system using
the shared random numbers, enhancing anti-jamming capabilities and resistance to eavesdropping
across the entire network.
Figure 7. Drone 0: Frequency Distribution, where a noticeable dip around 5500 Hz indicates a
reduced frequency count in the jammed region.
Figure 8. Drone 0: Frequency Sequence over 100 hops of the total 100,000 hops.
Figure 11. Drone 1: Frequency Distribution, where a noticeable dip around 5500 Hz indicates a
reduced frequency count in the jammed region.
Although this is a simplified setup for illustration purposes, and given that QRNG
are still at their early stage of development and deployment, to address the practical
implementation of distributing true random numbers to drones that are airborne, we
could adapt the concept of a shared memory system to a distributed model suitable
for a flying multi-drone environment. Instead of relying on a physical shared memory,
which is not feasible for drones in flight, we would need to implement a virtual shared
memory system facilitated through secure wireless communication channels. The QRNG
device would be stationed at a central ground control unit or a leading drone acting as a
coordinator. This QRNG would generate true random numbers, which are then securely
transmitted to each drone in the network using encrypted communication links prior to
Future Internet 2024, 16, 412 25 of 33
or during the mission. Each drone maintains a local buffer to store the received random
numbers for its FHSS operations. To manage the distribution and synchronization of
the random numbers, we would need to implement a concurrent access protocol as a
network protocol that ensures all drones receive the necessary random data in a timely
and secure manner. This protocol handles requests for random numbers, manages the
transmission schedules to avoid collisions, and verifies the integrity of the received data
using cryptographic techniques such as digital signatures or message authentication codes
(MACs). By virtualizing the shared memory over the network, we enable each drone
to have access to high-quality random numbers without the need for a physical shared
memory. This approach makes our methodology practical and implementable for drones
that are flying, allowing each drone to independently implement its own FHSS system while
maintaining synchronization with the rest of the network. The use of secure communication
channels and robust synchronization protocols ensures that the system remains resistant
to jamming, interception, and other forms of interference, thereby enhancing the overall
security and reliability of drone communications in complex operational scenarios.
Figure 12. Drone 1: Frequency Sequence over 100 hops of the total 100,000 hops.
Table 1. Qualitative Summary of Performance and Statistical Analysis for Each Drone.
The results indicate a high level of randomness, with Chi-squared values suggesting
non-uniformity at a fine scale (in part due to active jamming interference introduced
at 5500 Hz). This impact aligns with the frequency distribution patterns observed in
each drone’s logs, where a slight dip occurs around the jammed frequency. The low
p-values for the KS tests indicate statistically significant deviations from perfect uniformity,
suggesting that QRNG technology, while highly effective in generating random sequences,
may still require further refinement to reduce short-term correlations in the frequency
hopping sequences.
Future Internet 2024, 16, 412 27 of 33
Figure 15. Drone 2: Frequency Distribution, where a noticeable dip around 5500 Hz indicates a
reduced frequency count in the jammed region.
Figure 16. Drone 2: Frequency Sequence over 100 hops of the total 100,000 hops.
The performance logs provide further insight into the stability and robustness of the
QRNG-based frequency hopping system. Drones 0, 1, and 2 each maintained reliable
communication despite jamming interference, with performance variations reflecting the
adaptive response capabilities of the frequency exclusion list management.
• Frequency Exclusion Management: Each drone demonstrated successful avoidance
of the jammed 5500 Hz frequency during the experiment, which is evidenced by
fewer frequency selections in the impacted range. This illustrates the system’s dy-
namic response to interference, essential for secure drone communication in hos-
tile environments.
• Transmission Integrity: Packet integrity checks indicated no unauthorized modifica-
tions or data corruption, verifying the encryption and message authentication proto-
cols in place. The HMAC verification success rate was consistent across all drones,
reinforcing the communication channel’s resilience under QRNG-driven FHSS.
Future Internet 2024, 16, 412 28 of 33
Overall, the combination of statistical tests and performance metrics provides a com-
prehensive assessment of the QRNG-based FHSS system’s reliability. These results confirm
its potential as a robust security solution for multi-drone networks, even in the presence
of environmental interference and adversarial actions. Further enhancements to QRNG
stability and random sequence generation are anticipated to improve performance in
future deployments.
To better position our work within the landscape of related studies, we provide a qual-
itative comparison table (Table 2). This table contrasts our proposed QRNG-based FHSS
method with other security approaches commonly employed in wireless communication
and drone networks. Key aspects compared include the type of security technique utilized,
each study’s adaptability to jamming attacks, the computational complexity, and the source
of randomness in frequency generation. This comparison underscores the advantages of us-
ing QRNG-based true random frequency hopping for enhanced anti-jamming adaptability
and security, particularly in applications where unpredictability is crucial.
8. Discussion
The use of true random frequency hopping is particularly valuable in military and
defense contexts, where secure and reliable communication is critical. In a drone cloud
configuration, such systems can be employed for reconnaissance, surveillance, and combat
support, ensuring that communications remain secure from interception and jamming. The
high security provided by true random sequences helps protect sensitive information and
command instructions.
Drones equipped with secure communication systems can play a vital role in disaster
response and search and rescue operations. In scenarios where the environment may be
hostile or communication infrastructure is compromised, a drone cloud using true random
frequency hopping can maintain secure and reliable lines of communication. This is crucial
for coordinating efforts, relaying information, and ensuring the safety of personnel involved
in the operations.
Industries such as agriculture, logistics, and infrastructure inspection increasingly
use drone swarms to collect data and perform tasks. True random frequency hopping can
secure the communication links between drones, preventing industrial espionage and data
theft. For instance, in precision agriculture, drones can securely communicate real-time
data on crop health and soil conditions, enhancing the decision-making process.
Drones are extensively used for environmental monitoring, including wildlife tracking,
pollution assessment, and natural resource management. Secure communication ensures
that sensitive environmental data is protected, and that the drones’ operations cannot
be easily disrupted. This is particularly important in protected or sensitive areas where
unauthorized access or interference could have significant ecological impacts.
In the context of smart cities, drones can be used for infrastructure monitoring, traffic
management, and public safety. True random frequency hopping ensures that these drones
can communicate securely, protecting data on critical infrastructure and avoiding potential
security breaches that could disrupt urban services.
frequency hopping, could provide unprecedented levels of security, leveraging the inherent
unpredictability of quantum states.
Future systems may focus on creating interoperable communication platforms that can
work seamlessly across different types of drones and other autonomous systems. This could
involve standardizing true random frequency hopping protocols to ensure compatibility
and secure communication between diverse systems.
Ongoing research will likely focus on miniaturizing RPUs and improving their power
efficiency. This is crucial for expanding the use of true random frequency hopping in
smaller drones and other devices with limited power resources. Advances in materials
science and semiconductor technologies could play a key role in these developments.
As drones become more integrated into critical infrastructure and services, they will
become targets for cyber-physical attacks. Future research will likely explore ways to make
true random frequency hopping systems resilient not only to traditional jamming and
interception but also to sophisticated cyber-attacks aimed at disrupting drone operations.
9. Conclusions
In this paper, we presented a novel approach to enhancing the security and reliability
of Frequency Hopping Spread Spectrum (FHSS) systems by integrating a Quantum Random
Number Generator (QRNG) to generate truly random frequency hopping sequences. Our
methodology was applied to a simulated multi-drone network with a ring topology, where
each drone utilized true random sequences for frequency hopping, significantly improving
resistance against jamming and interception attempts.
The experimental results provided strong evidence supporting the security and relia-
bility claims of our QRNG-based FHSS system. The statistical analyses, including spectral
density, frequency distribution, and autocorrelation studies of the generated frequency
sequences, demonstrated the high randomness and unpredictability achieved:
• Uniform Frequency Distribution: The frequency distribution analyses showed a rela-
tively uniform spread of frequencies across the available spectrum for all drones. De-
spite the presence of simulated jamming at 5500 Hz, the drones effectively minimized
frequency usage in the jammed region, indicating successful adaptation and resilience.
• Low Autocorrelation: The autocorrelation analyses revealed sharp peaks at zero lag
and near-zero values for other lags, confirming the absence of significant periodicity
or predictability in the sequences. This lack of correlation enhances resistance to
predictive attacks and jamming.
• Spectral Analysis: The spectral density plots exhibited a relatively flat power spectral
density across frequencies, characteristic of truly random sequences. This uniform
spectral distribution reduces vulnerabilities to spectral-based jamming and interception.
• Resilience to Jamming: The system demonstrated effective avoidance of the jammed
frequency region, maintaining high numbers of frequency hops in non-jammed re-
gions. This adaptability highlightsa the system’s robustness in maintaining communi-
cation integrity under interference.
• Statistical Randomness Tests: The Chi-squared and Kolmogorov-Smirnov tests per-
formed on the frequency sequences indicated high levels of randomness, with some de-
viations due to the simulated jamming. The test results confirm that the QRNG-generated
sequences exhibit the necessary randomness properties for secure FHSS operation.
The implementation of AES encryption and HMAC verification successfully pro-
tected the frequency sequences and synchronization data from interception and tampering.
Throughout the experiments, no unauthorized access or data modification was detected,
highlighting the effectiveness of the integrated security measures.
While the results are promising, some short-term correlations were observed in the
autocorrelation analyses, suggesting areas for improvement in QRNG technology. These
correlations, though minimal, indicate that the QRNG devices are still maturing and that
future enhancements could further improve the quality of the generated random numbers
and the stability of the device.
Future Internet 2024, 16, 412 31 of 33
needed and take(s) full responsibility for the content of this publication. The authors would like to
thank the BARCELONA Supercomputing Center for providing access to MareNostrum 5 and tech-
nical support throughout this research. Thanks to the QUANTIC group, Artur García and Germán
Navarro, for discussions and instructional examples on the use of the QRNG device.
Conflicts of Interest: The authors declare that they have no conflict of interest. The funders had no
role in the design of the study, in the collection, analyses, or interpretation of data, in the writing of
the manuscript, or in the decision to publish the results.
Abbreviations
The following abbreviations are used in this manuscript:
References
1. de Zarzà, I.; de Curtò, J.; Roig, G.; Calafate, C.T. LLM Adaptive PID Control for B5G Truck Platooning Systems. Sensors 2023, 23,
5899. [CrossRef] [PubMed]
2. Dostert, K.M. Frequency-Hopping Spread-Spectrum Modulation for Digital Communications Over Electrical Power Lines. IEEE
J. Sel. Areas Commun. 1990, 8, 700–710. [CrossRef]
3. Liu, F.; Sun, G.; Zhang, S. Adaptive Measurement and Decoding of Frequency-Hopping Spread Spectrum Signals Based on
Knowledge Enhanced Compressed Sensing. IEEE Commun. Lett. 2021, 26, 1155–1159. [CrossRef]
4. Boutsioukis, N. Comparative Analysis of Pseudorandom Number Generators: Mersenne Twister, Middle Square Method, and
Linear Congruential Generator Through Dieharder Tests. 2023. Available online: https://ssrn.com/abstract=4354305 (accessed
on 1 September 2024).
5. Cannizzo, F. VMT19937: A SIMD-Friendly Pseudo Random Number Generator based on Mersenne Twister 19937. arXiv 2023,
arXiv:2309.16682. [CrossRef]
6. Liu, J.; Yao, X.; Wang, Y.; Wang, Z.; Xu, L.; Tong, H.; Liu, K. Novel Random SVPWM Technique Based on Tiny Mersenne Twister
PRNG to Reduce PWM Harmonic. In Proceedings of the Third International Conference on Mechanical Design and Simulation
(MDS 2023), Xi’an, China, 3–5 March 2023; SPIE Proceedings; Volume 12639, pp. 816–821. [CrossRef]
7. Soler, D.; Dafonte, C.; Fernández-Veiga, M.; Vilas, A.F.; Nóvoa, F.J. A privacy-preserving key transmission protocol to distribute
QRNG keys using zk-SNARKs. Comput. Netw. 2024, 242, 110259. [CrossRef]
8. Zheng, Z.; Guo, X.; Lin, F.; Wang, Y.; Wang, Y.; Guo, Y. Parallel CV-QRNG with Strict Entropy Evaluation. Photonics 2023, 10, 786.
[CrossRef]
9. Haider, Z.; Saeed, M.H.; Zaheer, M.E.; Alvi, Z.A.; Ilyas, M.; Nasreen, T.; Imran, M.; Islam, R.U.; Ikram, M. Quantum Random
Number Generator (QRNG): Theoretical and Experimental Investigations. Eur. Phys. J. Plus 2023, 138, 797. [CrossRef]
10. Pandey, S.K.; Jenef, R. A Comparative Study and Analysis of Quantum Random Number Generator with True Random Number
Generator. In Proceedings of the 2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS),
Bengaluru, India, 3–7 January 2024.
11. Lamarr, H.; Antheil, G. Secret Communication System. U.S. Patent No. 2,292,387, 11 August 1942.
12. Menezes, A.J.; van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press: Boca Raton, FL, USA, 1996.
13. Ma, X.; Yuan, X.; Cao, Z. Quantum random number generation. Npj Quantum Inf. 2016, 2, 16021. [CrossRef]
14. Jennewein, T.; Achleitner, U.; Weihs, G.; Weinfurter, H.; Zeilinger, A. A fast and compact quantum random number generator.
Rev. Sci. Instrum. 2000, 71, 1675–1680. [CrossRef]
15. Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM
1978, 21, 120–126. [CrossRef]
16. Miller, V.S. Use of elliptic curves in cryptography. In Advances in Cryptology—CRYPTO’85; Springer: Berlin/Heidelberg, Germany,
1985; pp. 417–426.
17. Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [CrossRef]
18. National Institute of Standards and Technology (NIST). Announcing the Advanced Encryption Standard (AES); FIPS Publication 197;
NIST: Gaithersburg, MD, USA, 2001.
19. Abellán, C.; Amaya, W.; Jofre, M.; Curty, M.; Acín, A.; Capmany, J.; Pruneri, V.; Mitchell, M.W. Ultra-fast quantum randomness
generation by accelerated phase diffusion in a pulsed laser diode. Opt. Express 2014, 22, 1645–1654. [CrossRef] [PubMed]
Future Internet 2024, 16, 412 33 of 33
20. Gupta, L.; Jain, R.; Vaszkun, G. Survey of important issues in UAV communication networks. IEEE Commun. Surv. Tutor. 2016, 18,
1123–1152. [CrossRef]
21. Shin, D.; Sharma, V.; Kim, J.; Kwon, S.; You, I. Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home
IoT Networks. IEEE Access 2017, 5, 11100–11117. [CrossRef]
22. Bekmezci, I.; Sahingoz, O.K.; Temel, Ş. Flying ad-hoc networks (FANETs): A survey. Ad Hoc Netw. 2013, 11, 1254–1270. [CrossRef]
23. Tu, W. Resource-Efficient Seamless Transitions for High-Performance Multi-Hop UAV Multicasting. Comput. Netw. 2022,
213, 109051. [CrossRef]
24. Abdollahi, M.; Malekinasab, K.; Tu, W.; Bag-Mohammadi, M. Physical-Layer Jammer Detection in Multihop IoT Networks. IEEE
Internet Things J. 2023, 10, 20574–20585. [CrossRef]
25. Zhu, J.; Wang, A.; Wu, W.; Zhao, Z.; Xu, Y.; Lei, R.; Yue, K. Deep-Learning-Based Recovery of Frequency-Hopping Sequences for
Anti-Jamming Applications. Electronics 2023, 12, 496. [CrossRef]
26. Eltholth, A.A. Improved Spectrum Coexistence in 2.4 GHz ISM Band Using Optimized Chaotic Frequency Hopping for Wi-Fi and
Bluetooth Signals. Sensors 2023, 23, 5183. [CrossRef]
27. Sokolov, V.; Skladannyi, P.; Platonenko, A. Jump-Stay Jamming Attack on Wi-Fi Systems. In Proceedings of the 2023 IEEE
18th International Conference on Computer Science and Information Technologies (CSIT), Lviv, Ukraine, 19–21 October 2023;
pp. 192–195.. [CrossRef]
28. Pärlin, K.; Riihonen, T.; Le Nir, V.; Adrat, M. Physical-layer reliability of drones and their counter-measures: Full vs. half duplex.
IEEE Trans. Wirel. Commun. 2023, 22, 5566–5581. [CrossRef]
29. Ganesan, T.; Jayarajan, N.; Shri Varun, B.G. Dynamic Control, Architecture, and Communication Protocol for Swarm Unmanned
Aerial Vehicles. In Computing in Intelligent Transportation Systems; Springer International Publishing: Cham, Switzerland, 2023;
pp. 31–49.
30. Herbst, J.; Müller, R.; Lipps, C.; Schotten, H.D. A Ring Topology Approach: Efficient Communication in Wireless Body Area
Networks (WBANs). In Proceedings of the 2024 Joint European Conference on Networks and Communications & 6G Summit
(EuCNC/6G Summit), Antwerp, Belgium, 3–6 June 2024; pp. 1084–1089.
31. Cirauqui, D.; García-March, M.Á.; Guigó Corominas, G.; Graß, T.; Grzybowski, P.R.; Muñoz-Gil, G.; Lewenstein, M. Comparing
pseudo- and quantum-random number generators with Monte Carlo simulations. APL Quantum 2024, 1, 036125. [CrossRef]
32. Mitchell, M.W.; Abellán, C.; Amaya, W. Strong Experimental Guarantees in Ultrafast Quantum Random Number Generation.
Phys. Rev. A 2015, 91, 012314. [CrossRef]
33. Álvarez, J.; Sarmiento, S.; Lázaro, J.; Gené, J.; Torres, J. Random Number Generation by Coherent Detection of Quantum Phase
Noise. Opt. Express 2020, 28, 5538–5547. [CrossRef] [PubMed]
34. Imran, M.; Sorianello, V.; Fresi, F.; Jalil, B.; Romagnoli, M.; Potì, L. On-Chip Tunable SOI Interferometer for Quantum Random
Number Generation Based on Phase Diffusion in Lasers. Opt. Commun. 2021, 485, 126736. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.