Research Article
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence
Figure 4
The duplicate suppression mechanism in AODV protocol, only with a weak link authentication. (a) RREQ process. (b) RREP process.
(a) |
(b) |