Login / Signup

On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication.

Mustapha BenssalahKarim Drouiche
Published in: SECRYPT (2023)
Keyphrases
  • authentication scheme
  • unmanned aerial vehicles
  • path planning
  • user authentication
  • similarity measure
  • network security
  • security requirements
  • secret key
  • key management
  • authentication protocol