Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles

Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions. In addition, they have been deployed in civilian critical infrastructure monitoring. In this environment, real-time and massive data is exchanged between the aerial vehicles and the...

Full description

Bibliographic Details
Main Author: Vincent Omollo Nyangaresi
Format: Article
Language:English
Published: Elsevier 2023-12-01
Series:High-Confidence Computing
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2667295223000521