Research Article
UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization
Figure 1
Three situations faced by unmanned aerial vehicles (UAVs) after attack or capture. (a) UAV on a flight mission; (b) UAVs performing a flight mission is captured by an attacker; (c) receiving unverifiable result of erasure; (d) blocked erasure requests by attackers; and (e) performing erasure operation and transmitting proof of erasure following capture.