Authorship Correction
There was an error in the authorship of the original publication [], and the correct authorship is as follows:
Tao Xia 1, Menglin Wang 1,*, Jun He 1,*, Gang Yang 1, Linna Fan 1 and Guoheng Wei 2
Text Correction
In the original publication [], corrections have been made to formula numbers and the description of “ground station” in Section 4.1. Initialization, as follows:
Both the UAV and ground station must complete an initialization phase before the UAV takes off. During this phase, both the UAV and ground station need to exchange and preprocess crucial parameters through a secure communication channel.
- The UAV and ground control station need to share elliptic curve parameters, such as , and relevant functions of the Kyber algorithm, specifically to select suitable secure elliptic curves and internal functions such as Kyber.Encaps().
- The ground station creates multiple private keys {,} and s {,}, and it shares the private key , unique ID , and its own public key with the UAV. Then, calculates according to Formula (1),generates according to Formula (2), calculates according to Formula (2),generates according to Formula (3),and calculates according to Formula (4).
- After obtaining the parameters {,,,} distributed by the ground station, the UAV needs to acquire the parameters {,,} through preprocessing and store them. The UAV calculates according to Formula (5),generates according to Formula (6), and calculates according to Formula (6),
The UAV u and were incorrectly written in Section 4.2. Identity Authentication Key Agreement Phase, and were revised as follows:
Step 1: The ground station () sends the message to UAV to initiate an identity authentication key agreement request.
Step 2: Upon receiving message , the UAV verifies and processes the data.
Step 2-2: The UAV calculates using Formula (8) and compares and to verify if they are the same. If they match, the verification is passed.
Step 2-3: The UAV decrypts using Equation (9) to obtain and .
Step 2-5: The UAV calculates using Equation (11).
Step 2-6: The UAV calculates using Equation (12).
Step 3: UAV sends the message to . The content of is
Step 4: UAV calculates the session key after sending , and the verifies the data and calculates the session key after receiving .
Step 4-1: UAV calculates the session key according to Equation (13). After the receives , it checks the . If it is the same as , it passes the check.
Step 4-2: The calculates according to Formula (14); if is the same as , it passes the verification.
There was a redundant bracket in Section 4.2. Identity Authentication Key Agreement Phase, which was changed as follows:
Upon receipt of }, forwards parameters { to based on a unique identifier ().
There was a redundant reference to Appendix A in Section 5. Security Analysis. The following sentence has been deleted:
Specific programming details are documented in Appendix A of this academic document.
There was the incorrect citation in the table contents in Section 5. Security Analysis, paragraph 7:
The security verification results are shown in Table 5. The first “Query” demonstrates that the shared key negotiated by the protocol designed in this paper is secure, meaning the attacker cannot obtain the shared key. The second “Query” indicates that the attacker has the capability to perform quantum attacks, rendering the keys derived from the ECC algorithm insecure. The third and fourth “Query” results indicate that a legitimate drone node can be authenticated by the ground station, meaning that the ground station can confirm the legitimacy of the drone upon the completion of the protocol. Similarly, a legitimate ground station node can be authenticated by the drone, meaning that the drone can confirm the legitimacy of the ground station upon the completion of the protocol.
In Section 6.1. Experiment, the processor model in the “Ground Station Configuration” part was incorrectly listed as “i7-360P CPU @ 2.2 GHz”. This has been corrected to “i7-1360P CPU @ 2.2 GHz”.
Error in Figure
In the original publication [], there was a mistake in Figure 5 as published. The corrected Figure 5 appears below.
Figure 5.
Identity authentication key agreement flowchart.
The authors state that the scientific conclusions are unaffected. This correction was approved by the Academic Editor. The original publication has also been updated.
Reference
- Xia, T.; Wang, M.; He, J.; Yang, G.; Fan, L.; Wei, G. A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm. Drones 2024, 8, 359. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).