Modern Information and Communication Technology Platforms: Advancing SecuDroneComm Management
DOI:
https://doi.org/10.31181/msa31202627Keywords:
Information and Communication Technology Platforms, Management Communications, Unmanned Aerial Vehicles, Communication Advances, Communication SystemsAbstract
The rapid advancement of information and communication technology (ICT) solutions has significantly changed the landscape of secure communication systems, especially in scenarios involving unmanned aerial vehicles (UAVs) and real-time data exchange. SecuDroneComm, a hybrid platform created for secure, low-latency communication between drones and command centers, represents an innovative management approach to tackling issues related to data security, latency, and scalability. This paper provides a thorough comparative analysis of SecuDroneComm alongside leading ICT platforms, including ITU-T X.805 frameworks, SmartNet architecture for energy systems, and federated global identity frameworks for mobile and wireless communications. By exploring these systems, we pinpoint essential design principles and innovations that have influenced secure management communication platforms, with a focus on encryption, data integrity, server architecture, and hybrid deployment strategies. The findings highlight the platform's flexibility in managing critical situations like battlefield intelligence, disaster response, and public health monitoring. Additionally, the analysis investigates possible improvements, such as the integration of 5G technologies, blockchain for data validation, and enhanced access control systems. SecuDroneComm’s cutting-edge architecture, which merges security with real-time responsiveness, provides notable benefits compared to both traditional and modern platforms, meeting the changing demands.
Downloads
References
Kumar, R., & Khan, R. A. (2024). Securing communication protocols in military computing. Network Security, 2024(3). https://doi.org/10.12968/S1353-4858(24)70011-7. DOI: https://doi.org/10.12968/S1353-4858(24)70011-7
Aldossary, M., Alzamil, I., & Almutairi, J. (2025). Enhanced intrusion detection in drone networks: a cross-layer convolutional attention approach for drone-to-drone and drone-to-base station communications. Drones, 9(1), 46. https://doi.org/10.3390/drones9010046. DOI: https://doi.org/10.3390/drones9010046
Shamshad, S., Belguith, S., & Oracevic, A. (2025). Securing the Skies: A Cutting-Edge Authenticated Key Establishment Protocol for the Internet of Drones. IEEE Internet of Things Journal, 12(14), 27113-27125. https://doi.org/10.1109/JIOT.2025.3562117. DOI: https://doi.org/10.1109/JIOT.2025.3562117
Latif, S., Djenouri, D., Idrees, Z., Ahmad, J., & Zou, Z. (2025). Hardware Security Modules for Secure Communications in the Industrial Internet of Things. IEEE Communications Surveys & Tutorials. https://doi.org/10.1109/COMST.2025.3600161. DOI: https://doi.org/10.1109/COMST.2025.3600161
Rahouti, M., Xiong, K., & Xin, Y. (2020). Secure software-defined networking communication systems for smart cities: Current status, challenges, and trends. IEEE Access, 9, 12083-12113. https://doi.org/10.1109/ACCESS.2020.3047996. DOI: https://doi.org/10.1109/ACCESS.2020.3047996
Mustafovski, R., Risteski, A., & Shuminoski, T. (2025). Challenges and solutions for enhancing Drone-to-TOC communication performance in military and crisis operations. ETIMA, 3(1), 148-156. https://doi.org/10.46763/ETIMA2531148m. DOI: https://doi.org/10.46763/ETIMA2531148m
Darwish, T., Alhaj, T. A., & Elhaj, F. A. (2025). Controller placement in software defined emerging networks: a review and future directions. Telecommunication Systems, 88(1), 18. https://doi.org/10.1007/s11235-024-01252-0. DOI: https://doi.org/10.1007/s11235-024-01252-0
Mandloi, D., Arya, R., & Verma, A. K. (2024). Internet of drones. In Recent Trends in Artificial Intelligence Towards a Smart World: Applications in Industries and Sectors (pp. 353-373). Singapore: Springer Nature Singapore. https://doi.org/10.1007/978-981-97-6790-8_13. DOI: https://doi.org/10.1007/978-981-97-6790-8_13
Mustafovski, R., Risteski, A., & Shuminoski, T. (2025). State-of-the-Art Comparison of the SecuDroneComm Platform with Existing Secure Drone Communication Systems. Proceedings of the International Conference "Annual conference on Challenges of Contemporary Higher Education, Kopaonik, Serbia, 3-7 February.
Mustafovski, R. (2025). Evaluating the Operational Impact of SecuDroneComm: Simulation-Based Assessment of Secure UAV Communication in Military Environments. Scientific Technical Review, 75(1), 11-18. DOI: https://doi.org/10.5937/str2500002M
Mustafovski, R. (2025). Formula-based Architectural Framework of the SecuDroneComm Platform for Unmanned Aerial Vehicle Communications. Management Science Advances, 2(1), 288-303. https://doi.org/10.31181/msa21202525. DOI: https://doi.org/10.31181/msa21202525
Tiron-Tudor, A., Deliu, D., & Ndou, V. (2025). Shaping the future: ethical, legal and social implications (ELSI) of digital innovation ecosystems (DIEs) amid the Twin Transition. European Journal of Innovation Management, 1-45. https://doi.org/10.1108/EJIM-12-2024-1524. DOI: https://doi.org/10.1108/EJIM-12-2024-1524
Martín Toral, I., Calvo, I., Villar, E., Gil-García, J. M., & Barambones, O. (2024). Introducing security mechanisms in OpenFog-compliant smart buildings. Electronics, 13(15), 2900. https://doi.org/10.3390/electronics13152900. DOI: https://doi.org/10.3390/electronics13152900
Saleem, M. U., Usman, M. R., Yaqub, M. A., Liotta, A., & Asim, A. (2024). Smarter grid in the 5G era: Integrating the internet of things with a cyber-physical system. IEEE Access, 12, 34002-34018. https://doi.org/10.1109/ACCESS.2024.3372379. DOI: https://doi.org/10.1109/ACCESS.2024.3372379
Xu, B., Zhang, Z., Sun, A., Guo, J., Wang, Z., Li, B., et al. (2023). T-FIM: transparency in federated identity management for decentralized trust and forensics investigation. Electronics, 12(17), 3591. https://doi.org/10.3390/electronics12173591. DOI: https://doi.org/10.3390/electronics12173591
Ni, J., Fang, G., Zhao, Y., Ren, J., Chen, L., & Ren, Y. (2024). Distributed Group Key Management Based on Blockchain. Electronics, 13(11), 2216. https://doi.org/10.3390/electronics13112216. DOI: https://doi.org/10.3390/electronics13112216
Vogt, F. G., Rothenberg, C., Lopes, V. H., Luizelli, M. C., Rodriguez, F., Papagianni, C., & Pongrácz, G. (2025). SmartNet: Bridging Performance and Realism in Network Emulation with SmartNICs. In Proceedings of the ACM SIGCOMM 2025 Posters and Demos (pp. 184-186). https://doi.org/10.1145/3744969.3748449. DOI: https://doi.org/10.1145/3744969.3748449
Poorvi, J., Kalita, A., & Gurusamy, M. (2025). Reliable and efficient data collection in uav based iot networks. IEEE Communications Surveys & Tutorials. https://doi.org/10.1109/COMST.2025.3550274. DOI: https://doi.org/10.1109/COMST.2025.3550274
Denis, R., & Madhubala, P. (2021). Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems. Multimedia Tools and Applications, 80(14), 21165-21202. https://doi.org/10.1007/s11042-021-10723-4. DOI: https://doi.org/10.1007/s11042-021-10723-4
Campagna, G., & Rehm, M. (2025). A Systematic Review of Trust Assessments in Human-Robot Interaction. ACM Transactions on Human-Robot Interaction, 14(2), 1-35. https://doi.org/10.1145/3706123. DOI: https://doi.org/10.1145/3706123
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Rexhep Mustafovski (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.









