Skip to main content
Erschienen in: The Journal of Supercomputing 6/2020

28.11.2017

A data authentication scheme for UAV ad hoc network communication

verfasst von: Jianguo Sun, Wenshan Wang, Liang Kou, Yun Lin, Liguo Zhang, Qingan Da, Lei Chen

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose an efficient and energy-saving distributed network architecture based on clustering stratification to solve the information security problem of unmanned aerial vehicle ad hoc network communication. And a double-authentication watermarking strategy is designed. In order to ensure that the data collected by nodes can be sent securely to the cluster head node, we use the self-characteristic of the collected data to generate the authentication watermark and insert it into the collected data at random. The cluster head node first verifies the integrity of collected data and deletes the suspicious data. Then, the authentication information is generated by combining the chaotic mapping method, and the watermark is hidden by changing the parity of the least significant bits of the data. Experimental results show that the proposed security strategy can resist most attacks, such as selective forwarding, data replay and tampering. Meanwhile, it has low energy consumption and low latency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hlavacs H (2013) Cooperative enhancement of position accuracy of unmanned aerial vehicles. In: International Conference on Advances in Mobile Computing and Multimedia, pp 326–334 Hlavacs H (2013) Cooperative enhancement of position accuracy of unmanned aerial vehicles. In: International Conference on Advances in Mobile Computing and Multimedia, pp 326–334
2.
Zurück zum Zitat Sharawi MS, Aloi DN, Rawashdeh OA (2010) Design and implementation of embedded printed antenna arrays in small UAV wing structures. IEEE Trans Antennas Propag 58(8):2531–2538 Sharawi MS, Aloi DN, Rawashdeh OA (2010) Design and implementation of embedded printed antenna arrays in small UAV wing structures. IEEE Trans Antennas Propag 58(8):2531–2538
3.
Zurück zum Zitat Ding G, Wang J, Wu Q et al (2014) Robust spectrum sensing with crowd sensors. IEEE Trans Commun 62(9):3129–3143 Ding G, Wang J, Wu Q et al (2014) Robust spectrum sensing with crowd sensors. IEEE Trans Commun 62(9):3129–3143
4.
Zurück zum Zitat Ding G, Wang J, Wu Q et al (2016) Cellular-base-station-assisted device-to-device communications in TV white space. IEEE J Sel Areas Commun 34(1):107–121 Ding G, Wang J, Wu Q et al (2016) Cellular-base-station-assisted device-to-device communications in TV white space. IEEE J Sel Areas Commun 34(1):107–121
5.
Zurück zum Zitat Gupta L, Jain R, Vaszkun G (2016) Survey of important issues in UAV communication networks. IEEE Commun Surv Tutor 18(2):1123–1152 Gupta L, Jain R, Vaszkun G (2016) Survey of important issues in UAV communication networks. IEEE Commun Surv Tutor 18(2):1123–1152
6.
Zurück zum Zitat Lin Y, Wang C, Wang J et al (2016) A novel dynamic spectrum access framework based on reinforcement learning for cognitive radio sensor networks. Sensors 16(10):1675 Lin Y, Wang C, Wang J et al (2016) A novel dynamic spectrum access framework based on reinforcement learning for cognitive radio sensor networks. Sensors 16(10):1675
7.
Zurück zum Zitat Thompson RB, Thulasiraman P (2016) Confidential and authenticated communications in a large fixed-wing UAV swarm. In: IEEE, International Symposium on Network Computing and Applications, pp 375–382 Thompson RB, Thulasiraman P (2016) Confidential and authenticated communications in a large fixed-wing UAV swarm. In: IEEE, International Symposium on Network Computing and Applications, pp 375–382
8.
Zurück zum Zitat Rajatha BS, Ananda CM, Nagaraj S (2015) Authentication of MAV communication using Caesar Cipher cryptography. In: International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials, pp 58–63 Rajatha BS, Ananda CM, Nagaraj S (2015) Authentication of MAV communication using Caesar Cipher cryptography. In: International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials, pp 58–63
9.
Zurück zum Zitat Zouhri O, Benhadou S, Medromi H (2017) A new adaptative security protocol for UAV network. In: El-Azouzi R, Menasche D, Sabir E, De Pellegrini F, Benjillali M (eds) Advances in ubiquitous networking 2. Lecture notes in electrical engineering, vol 397. Springer, Singapore Zouhri O, Benhadou S, Medromi H (2017) A new adaptative security protocol for UAV network. In: El-Azouzi R, Menasche D, Sabir E, De Pellegrini F, Benjillali M (eds) Advances in ubiquitous networking 2. Lecture notes in electrical engineering, vol 397. Springer, Singapore
10.
Zurück zum Zitat Juma H, Kamel I, Kaya L (2008) Watermarking sensor data for protecting the integrity. Int Conf Innov Inf Technol 280:598–602 Juma H, Kamel I, Kaya L (2008) Watermarking sensor data for protecting the integrity. Int Conf Innov Inf Technol 280:598–602
11.
Zurück zum Zitat Khan AN, Kiah ML, Madani SA, Ali M, Khan AU, Shamshirband S (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651 Khan AN, Kiah ML, Madani SA, Ali M, Khan AU, Shamshirband S (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651
12.
Zurück zum Zitat Ding G, Wu Q, Yao YD et al (2013) Kernel-based learning for statistical signal processing in cognitive radio networks: theoretical foundations, example applications, and future directions. IEEE Signal Process Mag 30(4):126–136 Ding G, Wu Q, Yao YD et al (2013) Kernel-based learning for statistical signal processing in cognitive radio networks: theoretical foundations, example applications, and future directions. IEEE Signal Process Mag 30(4):126–136
13.
Zurück zum Zitat Kamel I, Juma H (2011) A lightweight data integrity scheme for sensor networks. Sensors 11(4):4118–36 Kamel I, Juma H (2011) A lightweight data integrity scheme for sensor networks. Sensors 11(4):4118–36
14.
Zurück zum Zitat Qi J, Hu X, Ma Y (2015) A hybrid security and compressive sensing-based sensor data gathering scheme. IEEE Access 3:718–724 Qi J, Hu X, Ma Y (2015) A hybrid security and compressive sensing-based sensor data gathering scheme. IEEE Access 3:718–724
15.
Zurück zum Zitat Hayat S, Yanmaz E, Muzaffar R (2016) Survey on unmanned aerial vehicle networks for civil applications: a communications viewpoint. IEEE Commun Surv Tutor 18(4):2624–2661 Hayat S, Yanmaz E, Muzaffar R (2016) Survey on unmanned aerial vehicle networks for civil applications: a communications viewpoint. IEEE Commun Surv Tutor 18(4):2624–2661
16.
Zurück zum Zitat Pigatto DF, Roberto GF, Gonalves L, Filho JFR, Pinto ASR (2014) HAMSTER—healthy, mobility and security-based data communication architecture for Unmanned Aircraft Systems. In: International Conference on Unmanned Aircraft Systems, pp 52–63 Pigatto DF, Roberto GF, Gonalves L, Filho JFR, Pinto ASR (2014) HAMSTER—healthy, mobility and security-based data communication architecture for Unmanned Aircraft Systems. In: International Conference on Unmanned Aircraft Systems, pp 52–63
17.
Zurück zum Zitat Lin Y, Wang C, Ma C et al (2016) A new combination method for multisensor conflict information. J Supercomput 72(7):2874–2890 Lin Y, Wang C, Ma C et al (2016) A new combination method for multisensor conflict information. J Supercomput 72(7):2874–2890
18.
Zurück zum Zitat Li L, Yixiang X, Xiaoguang H, Haibin D (2015) A new rechargeable WSNs based multi-UAVs network and topology control algorithm. In: Industrial Electronics and Applications, pp 507–512 Li L, Yixiang X, Xiaoguang H, Haibin D (2015) A new rechargeable WSNs based multi-UAVs network and topology control algorithm. In: Industrial Electronics and Applications, pp 507–512
19.
Zurück zum Zitat Dong M, Ota K, Lin M, Tang Z, Du S, Zhu H (2014) UAV-assisted data gathering in wireless sensor networks. J Supercomput 70(3):1142–1155 Dong M, Ota K, Lin M, Tang Z, Du S, Zhu H (2014) UAV-assisted data gathering in wireless sensor networks. J Supercomput 70(3):1142–1155
20.
Zurück zum Zitat Rawat P, Singh KD, Chaouchi H, Bonnin JM (2014) Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput 68(1):1–48 Rawat P, Singh KD, Chaouchi H, Bonnin JM (2014) Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput 68(1):1–48
21.
Zurück zum Zitat Du X, Chen HH (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66 Du X, Chen HH (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66
22.
Zurück zum Zitat Shi X, Xiao D (2013) A reversible watermarking authentication scheme for wireless sensor networks. Inf Sci 240(11):173–183MathSciNet Shi X, Xiao D (2013) A reversible watermarking authentication scheme for wireless sensor networks. Inf Sci 240(11):173–183MathSciNet
23.
Zurück zum Zitat Li XY, Zhong YJ, Liao FB, Li R (2014) An improved watermarking scheme for secure data aggregation in WSNs. Appl Mech Mater 556–562(1):6298–6301 Li XY, Zhong YJ, Liao FB, Li R (2014) An improved watermarking scheme for secure data aggregation in WSNs. Appl Mech Mater 556–562(1):6298–6301
24.
Zurück zum Zitat Juma H, Kamel I, Kaya L (2008) On protecting the integrity of sensor data. IEEE Int Conf Electr Circuits Syst 280:902–905 Juma H, Kamel I, Kaya L (2008) On protecting the integrity of sensor data. IEEE Int Conf Electr Circuits Syst 280:902–905
25.
Zurück zum Zitat Wang B, Sun X, Ruan Z, Ren H (2011) Multi-mark: multiple watermarking method for privacy data protection in wireless sensor networks. Inf Technol J 10(4):1–8 Wang B, Sun X, Ruan Z, Ren H (2011) Multi-mark: multiple watermarking method for privacy data protection in wireless sensor networks. Inf Technol J 10(4):1–8
26.
Zurück zum Zitat Guo H, Li Y, Jajodia S (2007) Chaining watermarks for detecting malicious modifications to streaming data. Inf Sci 177(1):281–298 Guo H, Li Y, Jajodia S (2007) Chaining watermarks for detecting malicious modifications to streaming data. Inf Sci 177(1):281–298
27.
Zurück zum Zitat Kamel I, Juma H (2010) Simplified watermarking scheme for sensor networks. Indersci Publ 5(1):101–111 Kamel I, Juma H (2010) Simplified watermarking scheme for sensor networks. Indersci Publ 5(1):101–111
28.
Zurück zum Zitat Guan T, Chen Y (2016) A node clone attack detection scheme based on digital watermark in WSNs. In: IEEE International Conference on Computer Communication and the Internet, pp 257–260 Guan T, Chen Y (2016) A node clone attack detection scheme based on digital watermark in WSNs. In: IEEE International Conference on Computer Communication and the Internet, pp 257–260
29.
Zurück zum Zitat Boubiche DE, Boubiche S, Bilami A (2015) A cross-layer watermarking-based mechanism for data aggregation integrity in heterogeneous WSNs. IEEE Commun Lett 19(5):823–826 Boubiche DE, Boubiche S, Bilami A (2015) A cross-layer watermarking-based mechanism for data aggregation integrity in heterogeneous WSNs. IEEE Commun Lett 19(5):823–826
30.
Zurück zum Zitat Boubiche DE, Boubiche S, Toral-Cruz H, Pathan ASK, Bilami A, Athmani S (2016) SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommun Syst 62(2):277–288 Boubiche DE, Boubiche S, Toral-Cruz H, Pathan ASK, Bilami A, Athmani S (2016) SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommun Syst 62(2):277–288
31.
Zurück zum Zitat Sun X, Su J, Wang B, Liu Q (2013) Digital watermarking method for data integrity protection in wireless sensor networks. Int J Secur Appl 7(4):407–416 Sun X, Su J, Wang B, Liu Q (2013) Digital watermarking method for data integrity protection in wireless sensor networks. Int J Secur Appl 7(4):407–416
32.
Zurück zum Zitat Zhao Y, Hong Z, Luo Y et al (2017) Prediction-based spectrum management in cognitive radio networks. IEEE Syst J PP(99):1–12 Zhao Y, Hong Z, Luo Y et al (2017) Prediction-based spectrum management in cognitive radio networks. IEEE Syst J PP(99):1–12
Metadaten
Titel
A data authentication scheme for UAV ad hoc network communication
verfasst von
Jianguo Sun
Wenshan Wang
Liang Kou
Yun Lin
Liguo Zhang
Qingan Da
Lei Chen
Publikationsdatum
28.11.2017
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2020
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-017-2179-3

Weitere Artikel der Ausgabe 6/2020

The Journal of Supercomputing 6/2020 Zur Ausgabe