DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/9849
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChamola, Vinay-
dc.date.accessioned2023-03-20T06:12:12Z-
dc.date.available2023-03-20T06:12:12Z-
dc.date.issued2022-12-
dc.identifier.urihttps://ieeexplore.ieee.org/abstract/document/9839645-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/9849-
dc.description.abstractSwarm-based Unmanned Aerial Vehicle (UAV) applications require a large number of UAVs to be deployed across a region to work cooperatively. To operate a large number of unattended UAVs in hostile environments, it is critical to secure UAV-BS (base station) communications. UAV authentication based on Physical Unclonable Functions (PUFs) has recently emerged as a potential solution for overcoming adversarial attacks. The performance of PUF-based authentication protocols is strongly influenced by various factors, including the time required to generate the topology, the number of bottleneck connections, and the network's traffic load. This article investigates how the authentication time for a UAV swarm is affected by various factors such as the type of topology, number of UAVs in the swarm and the number of parallel connections.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectEEEen_US
dc.subjectTopologyen_US
dc.subjectAuthenticationen_US
dc.subjectBase stationsen_US
dc.subjectProtocolsen_US
dc.subjectNetwork topologyen_US
dc.subjectAutonomous aerial vehiclesen_US
dc.subjectParticle swarm optimization (PSO)en_US
dc.titleScalable Topologies for Time-Optimal Authentication of UAV Swarmsen_US
dc.typeArticleen_US
Appears in Collections:Department of Electrical and Electronics Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.