Research Article

UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization

Figure 4

Message flow depending on the communication environment. If the unmanned aerial vehicle (UAV) does not receive the hash value from the Ground Control Station (GCS) before the counter value reaches 0, the UAV proceeds with the erasure process and sends proof of erasure to the GCS.