Trustworthy Proof Method for Unmanned System Bee Colony Based on Edge Computing
An edge computing and trusted technology, applied in the field of network security, can solve problems such as high delay, inability to accurately trace the source of unmanned equipment, and inconvenient maintenance and processing, and achieve powerful computing capabilities, fast and efficient remote trusted certification, and remote certification efficiency Enhanced effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] In order to further illustrate the technical means and functions adopted by the present invention to achieve the intended purpose of the invention, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0038] Refer to attached figure 1 , an unmanned system bee colony trustworthy certification method based on edge computing proposed by the present invention, specifically implemented according to the following steps:
[0039] Step 1, build a UAV system bee colony trusted proof architecture:
[0040] Build a UAV system bee colony trusted proof architecture based on a three-layer hybrid structure, in which the first layer is the UAV networking layer, the second layer is the edge layer, and the third layer is the cloud; the trusted proof architecture includes four The participants are: the drone group (Prover) in the first layer of drone networking layer, the topology controller (Controller) and a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


