Research Article
An Identity Authentication Scheme Based on SM2 Algorithm in UAV Communication Network
Table 1
The Dolev-Yao model attacker capability assumptions.
| The ability of the attacker to have a capability | Capabilities not by the attacker |
| Obtain any through-communication network information | Do not have the ability to guess the random numbers in a large enough space | Having a legal identity in the communication network may impersonate other subjects to initiate communication with any subject | Without the correct key (or private key), an attacker cannot achieve a plaintext-to-ciphertext or ciphertext-to-plaintext conversion | Become the recipient of the information sent from any subject | You cannot solve a private part, for example, a private key that matches a given public key | Send messages posing as any subject to any other subject | An attacker cannot gain access to private areas such as the offline storage of individuals in the communication network. |
|
|