Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

A data authentication scheme for UAV ad hoc network communication

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In this paper, we propose an efficient and energy-saving distributed network architecture based on clustering stratification to solve the information security problem of unmanned aerial vehicle ad hoc network communication. And a double-authentication watermarking strategy is designed. In order to ensure that the data collected by nodes can be sent securely to the cluster head node, we use the self-characteristic of the collected data to generate the authentication watermark and insert it into the collected data at random. The cluster head node first verifies the integrity of collected data and deletes the suspicious data. Then, the authentication information is generated by combining the chaotic mapping method, and the watermark is hidden by changing the parity of the least significant bits of the data. Experimental results show that the proposed security strategy can resist most attacks, such as selective forwarding, data replay and tampering. Meanwhile, it has low energy consumption and low latency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Hlavacs H (2013) Cooperative enhancement of position accuracy of unmanned aerial vehicles. In: International Conference on Advances in Mobile Computing and Multimedia, pp 326–334

  2. Sharawi MS, Aloi DN, Rawashdeh OA (2010) Design and implementation of embedded printed antenna arrays in small UAV wing structures. IEEE Trans Antennas Propag 58(8):2531–2538

    Google Scholar 

  3. Ding G, Wang J, Wu Q et al (2014) Robust spectrum sensing with crowd sensors. IEEE Trans Commun 62(9):3129–3143

    Google Scholar 

  4. Ding G, Wang J, Wu Q et al (2016) Cellular-base-station-assisted device-to-device communications in TV white space. IEEE J Sel Areas Commun 34(1):107–121

    Google Scholar 

  5. Gupta L, Jain R, Vaszkun G (2016) Survey of important issues in UAV communication networks. IEEE Commun Surv Tutor 18(2):1123–1152

    Google Scholar 

  6. Lin Y, Wang C, Wang J et al (2016) A novel dynamic spectrum access framework based on reinforcement learning for cognitive radio sensor networks. Sensors 16(10):1675

    Google Scholar 

  7. Thompson RB, Thulasiraman P (2016) Confidential and authenticated communications in a large fixed-wing UAV swarm. In: IEEE, International Symposium on Network Computing and Applications, pp 375–382

  8. Rajatha BS, Ananda CM, Nagaraj S (2015) Authentication of MAV communication using Caesar Cipher cryptography. In: International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials, pp 58–63

  9. Zouhri O, Benhadou S, Medromi H (2017) A new adaptative security protocol for UAV network. In: El-Azouzi R, Menasche D, Sabir E, De Pellegrini F, Benjillali M (eds) Advances in ubiquitous networking 2. Lecture notes in electrical engineering, vol 397. Springer, Singapore

  10. Juma H, Kamel I, Kaya L (2008) Watermarking sensor data for protecting the integrity. Int Conf Innov Inf Technol 280:598–602

    Google Scholar 

  11. Khan AN, Kiah ML, Madani SA, Ali M, Khan AU, Shamshirband S (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651

    Google Scholar 

  12. Ding G, Wu Q, Yao YD et al (2013) Kernel-based learning for statistical signal processing in cognitive radio networks: theoretical foundations, example applications, and future directions. IEEE Signal Process Mag 30(4):126–136

    Google Scholar 

  13. Kamel I, Juma H (2011) A lightweight data integrity scheme for sensor networks. Sensors 11(4):4118–36

    Google Scholar 

  14. Qi J, Hu X, Ma Y (2015) A hybrid security and compressive sensing-based sensor data gathering scheme. IEEE Access 3:718–724

    Google Scholar 

  15. Hayat S, Yanmaz E, Muzaffar R (2016) Survey on unmanned aerial vehicle networks for civil applications: a communications viewpoint. IEEE Commun Surv Tutor 18(4):2624–2661

    Google Scholar 

  16. Pigatto DF, Roberto GF, Gonalves L, Filho JFR, Pinto ASR (2014) HAMSTER—healthy, mobility and security-based data communication architecture for Unmanned Aircraft Systems. In: International Conference on Unmanned Aircraft Systems, pp 52–63

  17. Lin Y, Wang C, Ma C et al (2016) A new combination method for multisensor conflict information. J Supercomput 72(7):2874–2890

    Google Scholar 

  18. Li L, Yixiang X, Xiaoguang H, Haibin D (2015) A new rechargeable WSNs based multi-UAVs network and topology control algorithm. In: Industrial Electronics and Applications, pp 507–512

  19. Dong M, Ota K, Lin M, Tang Z, Du S, Zhu H (2014) UAV-assisted data gathering in wireless sensor networks. J Supercomput 70(3):1142–1155

    Google Scholar 

  20. Rawat P, Singh KD, Chaouchi H, Bonnin JM (2014) Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput 68(1):1–48

    Google Scholar 

  21. Du X, Chen HH (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66

    Google Scholar 

  22. Shi X, Xiao D (2013) A reversible watermarking authentication scheme for wireless sensor networks. Inf Sci 240(11):173–183

    MathSciNet  Google Scholar 

  23. Li XY, Zhong YJ, Liao FB, Li R (2014) An improved watermarking scheme for secure data aggregation in WSNs. Appl Mech Mater 556–562(1):6298–6301

    Google Scholar 

  24. Juma H, Kamel I, Kaya L (2008) On protecting the integrity of sensor data. IEEE Int Conf Electr Circuits Syst 280:902–905

    Google Scholar 

  25. Wang B, Sun X, Ruan Z, Ren H (2011) Multi-mark: multiple watermarking method for privacy data protection in wireless sensor networks. Inf Technol J 10(4):1–8

    Google Scholar 

  26. Guo H, Li Y, Jajodia S (2007) Chaining watermarks for detecting malicious modifications to streaming data. Inf Sci 177(1):281–298

    Google Scholar 

  27. Kamel I, Juma H (2010) Simplified watermarking scheme for sensor networks. Indersci Publ 5(1):101–111

    Google Scholar 

  28. Guan T, Chen Y (2016) A node clone attack detection scheme based on digital watermark in WSNs. In: IEEE International Conference on Computer Communication and the Internet, pp 257–260

  29. Boubiche DE, Boubiche S, Bilami A (2015) A cross-layer watermarking-based mechanism for data aggregation integrity in heterogeneous WSNs. IEEE Commun Lett 19(5):823–826

    Google Scholar 

  30. Boubiche DE, Boubiche S, Toral-Cruz H, Pathan ASK, Bilami A, Athmani S (2016) SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommun Syst 62(2):277–288

    Google Scholar 

  31. Sun X, Su J, Wang B, Liu Q (2013) Digital watermarking method for data integrity protection in wireless sensor networks. Int J Secur Appl 7(4):407–416

    Google Scholar 

  32. Zhao Y, Hong Z, Luo Y et al (2017) Prediction-based spectrum management in cognitive radio networks. IEEE Syst J PP(99):1–12

    Google Scholar 

Download references

Acknowledgements

This work was supported by Project of NSFC of China (61472096, 61771154, 61202455, 61501132, 61301095).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yun Lin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, J., Wang, W., Kou, L. et al. A data authentication scheme for UAV ad hoc network communication. J Supercomput 76, 4041–4056 (2020). https://doi.org/10.1007/s11227-017-2179-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-017-2179-3

Keywords