Research Article

A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems

Table 2

Notations.

SymbolsExplanations

Trusted control center
User, UAV
Real and pseudo-identities of user
Public private key pair of
Secret keys of and
Pseudo-identity of
Concatenation, XOR, hash
Enc-decryption using as key