Abstract:UAVs are gaining momentum in various areas, whether it is in the commercial or private sector. Novel scenarios are extending the seemingly endless list of use cases for this emerging technology. To avoid ungoverned proliferation and abandoned aerial objects, not only regulations but also technical solutions are indispensable. Authentication of a UAV is required to link to the operator and respective competences. Besides appropriate competences, regulations are depending on regional authorities, which demands a… Show more
“…The server verifies the signature, therefore the corresponding public key must be provisioned during the initialization phase. An infrastructural trust-provisioning process as in [10] is required to be designed and implemented.…”
Section: B Overview Of Architecture Variantsmentioning
“…The server verifies the signature, therefore the corresponding public key must be provisioned during the initialization phase. An infrastructural trust-provisioning process as in [10] is required to be designed and implemented.…”
Section: B Overview Of Architecture Variantsmentioning
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.