Identifying a Malicious Node in a UAV Network
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT(2024)
Key words
Attacker,location,cheating identification,DSR,MANET,secret sharing,UAV,malicious node,man-in-the-middle
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined