Next Article in Journal
Quadrotor Unmanned Aerial Vehicle-Mounted Launch Device Precision Analysis for Countering Intruding Drones
Next Article in Special Issue
Secrecy-Constrained UAV-Mounted RIS-Assisted ISAC Networks: Position Optimization and Power Beamforming
Previous Article in Journal
Systematic Literature Review Methodology for Drone Recharging Processes in Agriculture and Disaster Management
Previous Article in Special Issue
Secure Unmanned Aerial Vehicle Communication in Dual-Function Radar Communication System by Exploiting Constructive Interference
 
 
Correction to Drones 2024, 8(8), 359.
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Correction

Correction: Xia et al. A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm. Drones 2024, 8, 359

1
College of Information and Communication, National University of Defense Technology, Wuhan 430030, China
2
School of Information Security, Naval University of Engineering, Wuhan 430030, China
*
Authors to whom correspondence should be addressed.
Drones 2025, 9(1), 41; https://doi.org/10.3390/drones9010041
Submission received: 7 November 2024 / Accepted: 27 November 2024 / Published: 9 January 2025
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)

Authorship Correction

There was an error in the authorship of the original publication [1], and the correct authorship is as follows:
Tao Xia 1, Menglin Wang 1,*, Jun He 1,*, Gang Yang 1, Linna Fan 1 and Guoheng Wei 2

Text Correction

In the original publication [1], corrections have been made to formula numbers and the description of “ground station” in Section 4.1. Initialization, as follows:
Both the UAV and ground station must complete an initialization phase before the UAV takes off. During this phase, both the UAV and ground station need to exchange and preprocess crucial parameters through a secure communication channel.
  • The UAV and ground control station need to share elliptic curve parameters, such as G , and relevant functions of the Kyber algorithm, specifically to select suitable secure elliptic curves and internal functions such as Kyber.Encaps().
  • The ground station g s creates multiple private keys { d g , d u } and u i d s { u i d g , u i d u }, and it shares the private key d u , unique ID u i d u , and its own public key P g with the UAV. Then, g s calculates P g according to Formula (1),
    generates r u according to Formula (2), calculates R u according to Formula (2),
    generates ( p k , s k ) according to Formula (3),
    and calculates T m p k , c t 1 , n o n c e , H m a c r according to Formula (4).
  • After obtaining the parameters { d u , P g , u i d u , u i d g } distributed by the ground station, the UAV needs to acquire the parameters { P u , r u , R u } through preprocessing and store them. The UAV calculates P u according to Formula (5),
    generates r u according to Formula (6), and calculates R u according to Formula (6),
The UAV u and H m a c g v were incorrectly written in Section 4.2. Identity Authentication Key Agreement Phase, and were revised as follows:
Step 1: The ground station ( g s ) sends the message M e s 1 to UAV u to initiate an identity authentication key agreement request.
Step 2: Upon receiving message M e s 1 , the UAV u verifies and processes the data.
Step 2-2: The UAV u calculates H m a c r v using Formula (8) and compares H m a c r v and H m a c r to verify if they are the same. If they match, the verification is passed.
Step 2-3: The UAV u decrypts c t 1 using Equation (9) to obtain p k and R u .
Step 2-5: The UAV u calculates c t 2 using Equation (11).
Step 2-6: The UAV u calculates H m a c g using Equation (12).
Step 3: UAV u sends the message M e s 2 to g s . The content of M e s 2 is { c t 2 ,   n o n c e ,   H m a c g }
Step 4: UAV u calculates the session key after sending M e s 2 , and the g s verifies the data and calculates the session key after receiving M e s 2 .
Step 4-1: UAV u calculates the session key according to Equation (13). After the g s receives M e s 2 , it checks the n o n c e . If it is the same as u i d u + 1 , it passes the check.
Step 4-2: The g s calculates H m a c g v according to Formula (14); if H m a c g v is the same as H m a c g , it passes the verification.
There was a redundant bracket in Section 4.2. Identity Authentication Key Agreement Phase, which was changed as follows:
Upon receipt of { c 1 , R 2 , u i d 2 , u i d 1 }, g s forwards parameters { c 1 , R 2 , u i d 2 , u i d 1 } to u 1 based on a unique identifier ( u i d 1 ).
There was a redundant reference to Appendix A in Section 5. Security Analysis. The following sentence has been deleted:
Specific programming details are documented in Appendix A of this academic document.
There was the incorrect citation in the table contents in Section 5. Security Analysis, paragraph 7:
The security verification results are shown in Table 5. The first “Query” demonstrates that the shared key negotiated by the protocol designed in this paper is secure, meaning the attacker cannot obtain the shared key. The second “Query” indicates that the attacker has the capability to perform quantum attacks, rendering the keys derived from the ECC algorithm insecure. The third and fourth “Query” results indicate that a legitimate drone node can be authenticated by the ground station, meaning that the ground station can confirm the legitimacy of the drone upon the completion of the protocol. Similarly, a legitimate ground station node can be authenticated by the drone, meaning that the drone can confirm the legitimacy of the ground station upon the completion of the protocol.
In Section 6.1. Experiment, the processor model in the “Ground Station Configuration” part was incorrectly listed as “i7-360P CPU @ 2.2 GHz”. This has been corrected to “i7-1360P CPU @ 2.2 GHz”.

Error in Figure

In the original publication [1], there was a mistake in Figure 5 as published. The corrected Figure 5 appears below.
Figure 5. Identity authentication key agreement flowchart.
Figure 5. Identity authentication key agreement flowchart.
Drones 09 00041 g005
The authors state that the scientific conclusions are unaffected. This correction was approved by the Academic Editor. The original publication has also been updated.

Reference

  1. Xia, T.; Wang, M.; He, J.; Yang, G.; Fan, L.; Wei, G. A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm. Drones 2024, 8, 359. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xia, T.; Wang, M.; He, J.; Yang, G.; Fan, L.; Wei, G. Correction: Xia et al. A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm. Drones 2024, 8, 359. Drones 2025, 9, 41. https://doi.org/10.3390/drones9010041

AMA Style

Xia T, Wang M, He J, Yang G, Fan L, Wei G. Correction: Xia et al. A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm. Drones 2024, 8, 359. Drones. 2025; 9(1):41. https://doi.org/10.3390/drones9010041

Chicago/Turabian Style

Xia, Tao, Menglin Wang, Jun He, Gang Yang, Linna Fan, and Guoheng Wei. 2025. "Correction: Xia et al. A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm. Drones 2024, 8, 359" Drones 9, no. 1: 41. https://doi.org/10.3390/drones9010041

APA Style

Xia, T., Wang, M., He, J., Yang, G., Fan, L., & Wei, G. (2025). Correction: Xia et al. A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm. Drones 2024, 8, 359. Drones, 9(1), 41. https://doi.org/10.3390/drones9010041

Article Metrics

Back to TopTop