Research Article
UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization
Table 1
Notations of the entity and messages.
| Definition of the Entity Symbols |
| GCS | Ground Control Station | UAV | Unmanned Aerial Vehicle |
| Denotation |
| msg = ∥ | Message contains two contexts ( and ) | msg = ∥ () | Message always contains context, but context is optionally contained. |
| Definition of the Message Symbols |
| | A symmetric key shared between and | | Encrypt with key | | Value to compute with hash function | | Number of hash function calculations | | Retransmission bit | | Authentication count | | Result of in the hash function | | Generated random data against replay attacks | | Address of hot data modified after previous authentication | | Address of accumulated data modified after previous authentication | | Set containing the addresses of hot data randomly selected and the values of those data | | Set containing the addresses of accumulated data randomly selected and the values of those data | | Proof of Erasure |
| Definition of the Greek Symbols |
| | Ratio of amount of randomly selected data in accumulated data region | | Ratio of amount of randomly selected data in hot data region | | Number of re-authentication permits | | Initial value of the counter |
|
|