Research Article

An Identity Authentication Scheme Based on SM2 Algorithm in UAV Communication Network

Figure 4

Schematic diagram of the literature [10] protocol certification process.