A data authentication scheme for UAV ad hoc network communication

Jianguo Sun, Wenshan Wang, Liang Kou, Yun Lin, Liguo Zhang, Qingan Da, Lei Chen

Research output: Contribution to journalArticlepeer-review

44 Scopus citations

Abstract

In this paper, we propose an efficient and energy-saving distributed network architecture based on clustering stratification to solve the information security problem of unmanned aerial vehicle ad hoc network communication. And a double-authentication watermarking strategy is designed. In order to ensure that the data collected by nodes can be sent securely to the cluster head node, we use the self-characteristic of the collected data to generate the authentication watermark and insert it into the collected data at random. The cluster head node first verifies the integrity of collected data and deletes the suspicious data. Then, the authentication information is generated by combining the chaotic mapping method, and the watermark is hidden by changing the parity of the least significant bits of the data. Experimental results show that the proposed security strategy can resist most attacks, such as selective forwarding, data replay and tampering. Meanwhile, it has low energy consumption and low latency.

Original languageEnglish
Pages (from-to)4041-4056
Number of pages16
JournalJournal of Supercomputing
Volume76
Issue number6
DOIs
StatePublished - Jun 1 2020

Scopus Subject Areas

  • Software
  • Theoretical Computer Science
  • Information Systems
  • Hardware and Architecture

Keywords

  • Clustering stratification
  • Data authentication
  • Digital watermarking
  • Suspicious packets filtering
  • UAV communication network

Fingerprint

Dive into the research topics of 'A data authentication scheme for UAV ad hoc network communication'. Together they form a unique fingerprint.

Cite this