[引用][C] Swarm UAV attack: how to protect sensitive data
Swarm UAV Attack: How to Protect Sensitive Data?
R Erra, V Guyot, L Avanthey, A Gademer… - The Institute Ecole …, 2012 - books.google.com
We consider the following scenario: a swarm of UAVs has a mission and a UAV from it has
been captured: is it possible to secure (in a broad sense) the sensitive data and software in
such a way as to avoid any information leak in this situation. In this article we study a
possible solution using in a complementary way: an embedded secure token (a smartcard);
Shamir's secret sharing algorithm associated to k-ary goodware. Either of these tools can
bring a very high level of security.
been captured: is it possible to secure (in a broad sense) the sensitive data and software in
such a way as to avoid any information leak in this situation. In this article we study a
possible solution using in a complementary way: an embedded secure token (a smartcard);
Shamir's secret sharing algorithm associated to k-ary goodware. Either of these tools can
bring a very high level of security.