DSpace Repository

Scalable Topologies for Time-Optimal Authentication of UAV Swarms

Show simple item record

dc.contributor.author Chamola, Vinay
dc.date.accessioned 2023-03-20T06:12:12Z
dc.date.available 2023-03-20T06:12:12Z
dc.date.issued 2022-12
dc.identifier.uri https://ieeexplore.ieee.org/abstract/document/9839645
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/9849
dc.description.abstract Swarm-based Unmanned Aerial Vehicle (UAV) applications require a large number of UAVs to be deployed across a region to work cooperatively. To operate a large number of unattended UAVs in hostile environments, it is critical to secure UAV-BS (base station) communications. UAV authentication based on Physical Unclonable Functions (PUFs) has recently emerged as a potential solution for overcoming adversarial attacks. The performance of PUF-based authentication protocols is strongly influenced by various factors, including the time required to generate the topology, the number of bottleneck connections, and the network's traffic load. This article investigates how the authentication time for a UAV swarm is affected by various factors such as the type of topology, number of UAVs in the swarm and the number of parallel connections. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.subject EEE en_US
dc.subject Topology en_US
dc.subject Authentication en_US
dc.subject Base stations en_US
dc.subject Protocols en_US
dc.subject Network topology en_US
dc.subject Autonomous aerial vehicles en_US
dc.subject Particle swarm optimization (PSO) en_US
dc.title Scalable Topologies for Time-Optimal Authentication of UAV Swarms en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account