Research Article

An Identity Authentication Scheme Based on SM2 Algorithm in UAV Communication Network

Table 1

The Dolev-Yao model attacker capability assumptions.

The ability of the attacker to have a capabilityCapabilities not by the attacker

Obtain any through-communication network informationDo not have the ability to guess the random numbers in a large enough space
Having a legal identity in the communication network may impersonate other subjects to initiate communication with any subjectWithout the correct key (or private key), an attacker cannot achieve a plaintext-to-ciphertext or ciphertext-to-plaintext conversion
Become the recipient of the information sent from any subjectYou cannot solve a private part, for example, a private key that matches a given public key
Send messages posing as any subject to any other subjectAn attacker cannot gain access to private areas such as the offline storage of individuals in the communication network.