Security authentication method for unmanned aerial vehicle group and unmanned aerial vehicle group
A security certification and drone technology, applied in the field of drone swarms, can solve security issues and other issues, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The present invention will be described in detail below in conjunction with various embodiments shown in the drawings. However, these embodiments do not limit the present invention, and structural, method, or functional changes made by those skilled in the art according to these embodiments are included in the protection scope of the present invention.
[0046] Before introducing the security authentication method of the UAV swarm in this application, the system model of the UAV swarm to which this method can be applied is firstly introduced.
[0047] After the UAV group takes off from the ground station, it may be disconnected from the ground station. At this time, the UAV is divided into several small mission units, and each mission unit has a UAV that will be used as the leader. The aircraft collects information sent by the following member aircraft, distributes new information, conducts command and information collection, and acts as a mobile ground station. The ci...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


