Analysis of the Features of Using Cryptographic Algorithms and Protocols for Uav Protection
This paper investigates the features of constructing and applying cryptographic protocols to protect unmanned aerial vehicles (UAVs) from cyberattacks.
Today, we witness a uniquely rapid development of military-purpose UAVs. This unprecedented growth is driven by the decisive influence of combat UAV characteristics on the outcomes of real military operations. Additionally, this development is based on the analyzed, documented, and recognized results of UAV usage in combat conditions.