A blockchain authentication scheme for UAV-aided fog computing

Abstract Unmanned Aerial Vehicle (UAV) swarms not only expanded the application areas of UAVs but also brought more complex challenges to security. Both the data collected by UAVs and UAVs themselves are easy targets for hackers. Once a hacker has intercepted communication information or hijacked a...

Full description

Bibliographic Details
Main Authors: Xiaoyu Du, Song Tao, Ke Yuan, Yinyin Li, Yi Zhou
Format: Article
Language:English
Published: Springer 2023-09-01
Series:Complex & Intelligent Systems
Subjects:
Online Access:https://doi.org/10.1007/s40747-023-01232-y