Identity-based radar spectrum analysis for UAV detection, classification, and authentication using machine learning and blockchain
Aminu Abdulkadir Mahmoud1, 2, Sofia Najwa Ramli3, Mohd Aifaa Mohd Ariff4, Umar Shafiu Haruna2 and Aisha Umar Suleiman2
Department of Cybersecurity,Faculty of Computing, Northwest University,Kano,Nigeria2
Centre for Cybersecurity and Data Intelligence,Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia and Etienne Innovation Sdn. Bhd., Batu Pahat,Johor,Malaysia3
Faculty of Electrical and Electronic Engineering,Universiti Tun Hussein Onn Malaysia, Batu Pahat, Johor, Malaysia and Etienne Innovation Sdn. Bhd., Batu Pahat,Johor,Malaysia4
Corresponding Author : Aminu Abdulkadir Mahmoud
Recieved : 23-February-2025; Revised : 16-March-2026; Accepted : 17-April-2026
Abstract
The growing use of unmanned aerial vehicles (UAVs) has heightened security concerns related to identity verification and authentication. Existing systems can classify UAVs using micro-Doppler (m-D) signatures but lack reliable mechanisms to prevent spoofing and impersonation. Similarly, current authentication methods including remote identification (RID), blockchain, and cryptographic schemes face cybersecurity and scalability challenges. This study proposes a novel identity-based authentication model that integrates m-D signature analysis with blockchain technology. Radar systems extract eleven discriminative UAV features, which are classified using k-nearest neighbors (kNN), support vector machine (SVM), and random forest (RF) algorithms. The classified identities are cross-verified with blockchain-stored RID data to ensure tamper-resistant authentication. Experiments conducted on ten UAV models, including Da-Jiang innovations (DJI) and Autel series, achieved 99.9% accuracy using the RF classifier. Scalability is maintained through a practical Byzantine fault tolerance (PBFT) consensus mechanism in Hyperledger Fabric, enabling sub-250 ms authentication latency and throughput exceeding 1200 transactions per second, outperforming proof-of-work–based systems. The proposed model effectively combines radar-based m-D analysis with blockchain verification, ensuring secure, scalable, and tamper-proof UAV identification compliant with RID regulations, thereby strengthening airspace security and UAV communication integrity.
Keywords
Unmanned aerial vehicles (UAVs), Micro-doppler signatures, Blockchain authentication, Radar-based UAV identification, Machine learning classification, Secure UAV communication.
Cite this article
Mahmoud AA, Ramli SN, Ariff MAM, Haruna US, Suleiman AU. Identity-based radar spectrum analysis for UAV detection, classification, and authentication using machine learning and blockchain. International Journal of Advanced Technology and Engineering Exploration. 2026;13(137):512-540. DOI : 10.19101/IJATEE.2025.121220273
[1] De MCF, E STD, Boeira F, Stocchero JM, Vinel A, Asplund M, et al. UAVouch: a secure identity and location validation scheme for UAV-networks. IEEE Access. 2021; 9:82930-46.
[2] Ahsan M, Nygard KE, Gomes R, Chowdhury MM, Rifat N, Connolly JF. Cybersecurity threats and their mitigation approaches using machine learning-a review. Journal of Cybersecurity and Privacy. 2022; 2(3):527-55.
[3] Kang KB, Choi JH, Cho BL, Lee JS, Kim KT. Analysis of micro-doppler signatures of small UAVs based on doppler spectrum. IEEE Transactions on Aerospace and Electronic Systems. 2021; 57(5):3252-67.
[4] Ináncsi M. Cybersecurity challenges of the civilian unmanned aircraft systems. Hadmérnök. 2022; 17(2):205-16.
[5] Alladi T, Venkatesh V, Chamola V, Chaturvedi N. Drone-MAP: a novel authentication scheme for drone-assisted 5G networks. In infocom conference on computer communications workshops 2021 (pp. 1-6). IEEE.
[6] Tian J, Wang C, Cao J, Wang X. Fully convolutional network-based fast UAV detection in pulse doppler radar. IEEE Transactions on Geoscience and Remote Sensing. 2024; 62:1-12.
[7] Hong T, Fang C, Hao H, Sun W. Identification technology of UAV based on micro-doppler effect. In international wireless communications and mobile computing (IWCMC) 2021 (pp. 308-11). IEEE.
[8] Reddy VV, Peter S. UAV micro-doppler signature analysis using FMCW radar. In radar conference (RadarConf21) 2021 (pp. 1-6). IEEE.
[9] Ji G, Song C, Huo H. Detection and identification of low-slow-small rotor unmanned aerial vehicle using micro-doppler information. IEEE Access. 2021; 9:99995-100008.
[10] Fu R, Al-absi MA, Kim KH, Lee YS, Al-absi AA, Lee HJ. Deep learning-based drone classification using radar cross section signatures at mmwave frequencies. IEEE Access. 2021; 9:161431-44.
[11] Golam M, Akter R, Tuli EA, Kim DS, Lee JM. Lightweight blockchain assisted unauthorized UAV access prevention in the Internet of military things. In 13th international conference on information and communication technology convergence (ICTC) 2022 (pp. 890-4). IEEE.
[12] Han P, Sui A, Wu J. Identity management and authentication of a UAV swarm based on a blockchain. Applied Sciences. 2022; 12(20):1-18.
[13] Rojhani N, Passafiume M, Sadeghibakhi M, Collodi G, Cidronali A. Model-based data augmentation applied to deep learning networks for classification of micro-doppler signatures using FMCW radar. IEEE Transactions on Microwave Theory and Techniques. 2023; 71(5):2222-36.
[14] Sayed AN, Ramahi OM, Shaker G. UAV classification utilizing radar digital twins. In international symposium on antennas and propagation and USNC-URSI radio science meeting (USNC-URSI) 2023 (pp. 741-2). IEEE.
[15] Hong T, Li Y, Fang C, Dong W, Chen Z. Extracting micro-doppler features from multi-rotor unmanned aerial vehicles using time-frequency rotation domain concentration. Drones. 2024 ;8(1):1-16.
[16] Zulkarnain SA, Zulkifli S, Ali AM. Identification and analysis of micro-doppler signature of a bird versus micro-UAV. Journal of Advanced Research in Micro and Nano Engineering. 2024; 16(1):102-13.
[17] He Y, Zhang J, Xi R, Na X, Sun Y, Li B. Detection and identification of non-cooperative UAV using a cots mmwave radar. ACM Transactions on Sensor Networks. 2024; 20(2):1-22.
[18] Lu G, Bu Y. Mini-UAV movement classification based on sparse decomposition of micro-doppler signature. IEEE Geoscience and Remote Sensing Letters. 2024; 21:1-5.
[19] Bourn W, Paine S, Pidanic J. Micro-doppler signature classification of unmanned aerial vehicles using FMCW radar. In international radar conference (RADAR) 2024 (pp. 1-6). IEEE.
[20] Zhou H, Chen Y, Gong A, Zhu Y, Mo C, Xie W. UAV Identification via multi-scale decision fusion CNN utilizing micro-doppler features. IEEE Geoscience and Remote Sensing Letters. 2025; 22(2): 3505005.
[21] Zhang L, Zhu Y, Chen Y, Zhou H, Shen C. Three-dimensional micro-doppler parameter estimation of rotor target based on VEMW radar. IEEE Sensors Journal. 2025; 25(6):10155-62.
[22] Yu S, Lee J, Sutrala AK, Das AK, Park Y. LAKA-UAV: lightweight authentication and key agreement scheme for cloud-assisted unmanned aerial vehicle using blockchain in flying ad-hoc networks. Computer networks. 2023; 224:109612.
[23] Huang K, Hu H, Lin C. Bakas-UAV: a secure blockchain-assisted authentication and key agreement scheme for unmanned aerial vehicles networks. IEEE Internet of Things Journal. 2024; 11(22):36858-83.
[24] Wang W, Han Z, Gadekallu TR, Raza S, Tanveer J, Su C. Lightweight blockchain-enhanced mutual authentication protocol for UAVs. IEEE Internet of Things Journal. 2023; 11(6):9547-57.
[25] Karmakar R, Kaddoum G, Akhrif O. A blockchain-based distributed and intelligent clustering-enabled authentication protocol for UAV swarms. IEEE Transactions on Mobile Computing. 2023; 23(5):6178-95.
[26] Yu S, Das AK, Park Y. RLBA-UAV: a robust and lightweight blockchain-based authentication and key agreement scheme for PUF-enabled UAVs. IEEE Transactions on Intelligent Transportation Systems. 2024; 25(12):21697-708.
[27] Xu Q, Jin J, Su Z, Li R, Wang Y, Fang D, et al. Blockchain-based layered secure edge content delivery in UAV-assisted vehicular networks. IEEE Transactions on Vehicular Technology. 2024; 74(5):7914-27.
[28] Miao J, Wang Z, Ning X, Shankar A, Maple C, Rodrigues JJ. A UAV-assisted authentication protocol for internet of vehicles. IEEE Transactions on Intelligent Transportation Systems. 2024; 25(8):10286-97.
[29] Wang J, Wang J, Tong Z, Jiao Z, Zhang M, Jiang C. ACBFT: adaptive chained byzantine fault-tolerant consensus protocol for UAV ad hoc networks. IEEE Transactions on Vehicular Technology. 2025; 74(7):11324 -36.
[30] Xie M, Chang Z, Wang L, Min G. Blockchain-assisted lightweight cross-domain authentication for multi-UAV wireless networks. IEEE Transactions on Mobile Computing. 2025; 24(11):11449-64.
[31] Kharjana M, Sahana SC, Saha G. Securing autonomous UAV cluster with blockchain-based threshold key management system utilizing crypto-asset and multisignature. IEEE Transactions on Mobile Computing. 2025; 24(7):5765-78.
