Research Article

A Random Label and Lightweight Hash-Based Security Authentication Mechanism for a UAV Swarm

Algorithm 1

The encryption algorithm of RC4.
1: Generate key stream seed 1:
2: Given a state vector S, initialize it, and assign 0, 1, 2, ..., 254, 255 to each byte in ascending order;
3: fordo
4: ;
5: end for
6: Enter the initial key:
7: The initial key is defined as any combination of less than 256 bytes;
8: Fill in circularly until 256 bytes are filled;
9: The final result is defined as a vector T, which is used to generate seed 2;
10: Disrupt the initial seed 1:
11: Perform a replacement operation on the state vector S, starting from the 0th byte, and executing 256 times to ensure that each byte is processed;
12: ;
13: fordo
14: ;
15: ;
16: end for
17: Generate key stream and encrypt:
18: ;
19: while clabel.length– do
20: ;
21: ;
22: ;
23: ;
24: ;
25: ;
26: end while