Abstract—The Unmanned Aerial Vehicle (UAV) (sometimes known as a "drone") is used in a variety of fields. Unfortunately, as they become more popular and in demand, they become more vulnerable to a variety of security threats. To combat such attacks and security threats, a proper design of a robust security and authentication system based on and stream cipher lightweight salsa20 algorithm with chaotic maps is required. By using a proposed key generation method which is based on a 1d Logistic chaotic map to produce a flight session key for a drone with a flight plan, and then records the flight session key and the drone's flight plan in a central database that can be accessed. Finally, while the drone is flying, a GCS checks authentication of the current flight session based on the on flight session key and its flight plan as the message authentication code key to authenticate the drone by any flight session, and the drone after which uses salsa20 lightweight to cipher payload data to improve security Network Transfer of RTCM Messages over Internet Protocol Protocol (NTRIP) communication protocol and send it to GCS, and at last, a GCS verifies authentication of the current flight session based on the on flight session key and its flight plan as the message authentication code key to authenticate the drone. The proposed system is superior to other similar systems in terms of security and performance, according to the review. Keywords—Unmanned Aerial Vehicle (UAV), Light- Weight Cryptography, Salsa20 Lightweight Algorithm, Network Transfer of RTCM Messages over Internet Protocol (NTRIP), 1d Logistic Function, Error Sensitivity Measurements. I. INTRODUCTION Drones are expected to have numerous advantages over regular vehicles, including the ability to drive at a continuous and faster speed, the absence of physical road infrastructure, route directness, and the avoidance of traffic and congestion. They are expected to shorten delivery times and improve logistics system responsiveness. These advantages of UAV-based distribution are especially noticeable in urban areas. The ensuing time and cost i) savings in commercial logistics systems could benefit both companies and customers, and ii) save lives and improve public health and safety by improving emergency services and medical supply [1]. Most autonomous drones only fly at a lower speed near hover to ensure that they can accurately sense their surroundings and have enough time to avoid obstacles. Human pilots have demonstrated that drones are capable of flying at astonishing speeds over complex terrain such as racetracks [2]. Despite the dangers and threats that manned aircraft provide to soldiers, drones were specifically created for military purposes, but they now have a wide range of additional uses. Drones are also utilized for airborne inspection and monitoring of electricity lines and oil and gas pipelines, in addition to package delivery [3]. Rather than using remote controllers, technological improvements have made it possible to control mini-drones using basic manipulations via cell phones. Drones will be used for a variety of applications, not simply commercial or personal. Law enforcement and border patrol agencies employ drones for surveillance. Drones can be used for harmful purposes as well. As a result, it is necessary to detect them and prevent them from causing damage [4]. As a result of the various attack tactics and targets, the outcomes vary. Some attacks attempt to steal data through communication connection security weaknesses, while others aim to spoof sensors, such as GPS spoofing. In this work, we propose the security of the drone communication network for surmounting the challenging information leakage problem due to potential eavesdropping. This work aims to design an authentication system model between the drones and ground stations and make a secure channel to exchange data using lightweight algorithms. To increase the security of information transmission through drone communications with ground Secured Drone Communication Based on Esalsa20 Algorithm 1 Ibtesam Jomaa 1 Computer Science Department, Diyala University, 320001, Diyala, Iraq 2 Worud Mahdi Saleh 2 Directorate General of Education in Diyala, Ministry of Education, 320001, Diyala, Iraq 3 Rasha Rokan Ismail 3 Computer Science Department, Diyala University, 320001, Diyala, Iraq 4 Saja Huzber Hussien 4 Ministry of Higher Education and Scientific Research, Diyala University, 320001, Diyala, Iraq Received: August 11, 2022. Revised: January 14, 2023. Accepted: February 15, 2023. Published: March 6, 2023. INTERNATIONAL JOURNAL OF CIRCUITS, SYSTEMS AND SIGNAL PROCESSING DOI: 10.46300/9106.2023.17.8 Volume 17, 2023 E-ISSN: 1998-4464 67