Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles

Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions. In addition, they have been deployed in civilian critical infrastructure monitoring. In this environment, real-time and massive data is exchanged between the aerial vehicles and the...

Full description

Bibliographic Details
Published in:High-Confidence Computing
Main Author: Vincent Omollo Nyangaresi
Format: Article
Language:English
Published: Elsevier 2023-12-01
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2667295223000521