Abstract
In this paper, we propose an efficient and energy-saving distributed network architecture based on clustering stratification to solve the information security problem of unmanned aerial vehicle ad hoc network communication. And a double-authentication watermarking strategy is designed. In order to ensure that the data collected by nodes can be sent securely to the cluster head node, we use the self-characteristic of the collected data to generate the authentication watermark and insert it into the collected data at random. The cluster head node first verifies the integrity of collected data and deletes the suspicious data. Then, the authentication information is generated by combining the chaotic mapping method, and the watermark is hidden by changing the parity of the least significant bits of the data. Experimental results show that the proposed security strategy can resist most attacks, such as selective forwarding, data replay and tampering. Meanwhile, it has low energy consumption and low latency.
Similar content being viewed by others
References
Hlavacs H (2013) Cooperative enhancement of position accuracy of unmanned aerial vehicles. In: International Conference on Advances in Mobile Computing and Multimedia, pp 326–334
Sharawi MS, Aloi DN, Rawashdeh OA (2010) Design and implementation of embedded printed antenna arrays in small UAV wing structures. IEEE Trans Antennas Propag 58(8):2531–2538
Ding G, Wang J, Wu Q et al (2014) Robust spectrum sensing with crowd sensors. IEEE Trans Commun 62(9):3129–3143
Ding G, Wang J, Wu Q et al (2016) Cellular-base-station-assisted device-to-device communications in TV white space. IEEE J Sel Areas Commun 34(1):107–121
Gupta L, Jain R, Vaszkun G (2016) Survey of important issues in UAV communication networks. IEEE Commun Surv Tutor 18(2):1123–1152
Lin Y, Wang C, Wang J et al (2016) A novel dynamic spectrum access framework based on reinforcement learning for cognitive radio sensor networks. Sensors 16(10):1675
Thompson RB, Thulasiraman P (2016) Confidential and authenticated communications in a large fixed-wing UAV swarm. In: IEEE, International Symposium on Network Computing and Applications, pp 375–382
Rajatha BS, Ananda CM, Nagaraj S (2015) Authentication of MAV communication using Caesar Cipher cryptography. In: International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials, pp 58–63
Zouhri O, Benhadou S, Medromi H (2017) A new adaptative security protocol for UAV network. In: El-Azouzi R, Menasche D, Sabir E, De Pellegrini F, Benjillali M (eds) Advances in ubiquitous networking 2. Lecture notes in electrical engineering, vol 397. Springer, Singapore
Juma H, Kamel I, Kaya L (2008) Watermarking sensor data for protecting the integrity. Int Conf Innov Inf Technol 280:598–602
Khan AN, Kiah ML, Madani SA, Ali M, Khan AU, Shamshirband S (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651
Ding G, Wu Q, Yao YD et al (2013) Kernel-based learning for statistical signal processing in cognitive radio networks: theoretical foundations, example applications, and future directions. IEEE Signal Process Mag 30(4):126–136
Kamel I, Juma H (2011) A lightweight data integrity scheme for sensor networks. Sensors 11(4):4118–36
Qi J, Hu X, Ma Y (2015) A hybrid security and compressive sensing-based sensor data gathering scheme. IEEE Access 3:718–724
Hayat S, Yanmaz E, Muzaffar R (2016) Survey on unmanned aerial vehicle networks for civil applications: a communications viewpoint. IEEE Commun Surv Tutor 18(4):2624–2661
Pigatto DF, Roberto GF, Gonalves L, Filho JFR, Pinto ASR (2014) HAMSTER—healthy, mobility and security-based data communication architecture for Unmanned Aircraft Systems. In: International Conference on Unmanned Aircraft Systems, pp 52–63
Lin Y, Wang C, Ma C et al (2016) A new combination method for multisensor conflict information. J Supercomput 72(7):2874–2890
Li L, Yixiang X, Xiaoguang H, Haibin D (2015) A new rechargeable WSNs based multi-UAVs network and topology control algorithm. In: Industrial Electronics and Applications, pp 507–512
Dong M, Ota K, Lin M, Tang Z, Du S, Zhu H (2014) UAV-assisted data gathering in wireless sensor networks. J Supercomput 70(3):1142–1155
Rawat P, Singh KD, Chaouchi H, Bonnin JM (2014) Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput 68(1):1–48
Du X, Chen HH (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66
Shi X, Xiao D (2013) A reversible watermarking authentication scheme for wireless sensor networks. Inf Sci 240(11):173–183
Li XY, Zhong YJ, Liao FB, Li R (2014) An improved watermarking scheme for secure data aggregation in WSNs. Appl Mech Mater 556–562(1):6298–6301
Juma H, Kamel I, Kaya L (2008) On protecting the integrity of sensor data. IEEE Int Conf Electr Circuits Syst 280:902–905
Wang B, Sun X, Ruan Z, Ren H (2011) Multi-mark: multiple watermarking method for privacy data protection in wireless sensor networks. Inf Technol J 10(4):1–8
Guo H, Li Y, Jajodia S (2007) Chaining watermarks for detecting malicious modifications to streaming data. Inf Sci 177(1):281–298
Kamel I, Juma H (2010) Simplified watermarking scheme for sensor networks. Indersci Publ 5(1):101–111
Guan T, Chen Y (2016) A node clone attack detection scheme based on digital watermark in WSNs. In: IEEE International Conference on Computer Communication and the Internet, pp 257–260
Boubiche DE, Boubiche S, Bilami A (2015) A cross-layer watermarking-based mechanism for data aggregation integrity in heterogeneous WSNs. IEEE Commun Lett 19(5):823–826
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan ASK, Bilami A, Athmani S (2016) SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommun Syst 62(2):277–288
Sun X, Su J, Wang B, Liu Q (2013) Digital watermarking method for data integrity protection in wireless sensor networks. Int J Secur Appl 7(4):407–416
Zhao Y, Hong Z, Luo Y et al (2017) Prediction-based spectrum management in cognitive radio networks. IEEE Syst J PP(99):1–12
Acknowledgements
This work was supported by Project of NSFC of China (61472096, 61771154, 61202455, 61501132, 61301095).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sun, J., Wang, W., Kou, L. et al. A data authentication scheme for UAV ad hoc network communication. J Supercomput 76, 4041–4056 (2020). https://doi.org/10.1007/s11227-017-2179-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-017-2179-3