Research Article

A Random Label and Lightweight Hash-Based Security Authentication Mechanism for a UAV Swarm

Figure 6

The iteration process of SHA-256.