A data authentication scheme for UAV ad hoc network communication

作者:Sun, Jianguo; Wang, Wenshan; Kou, Liang; Lin, Yun*; Zhang, Liguo; Da, Qingan; Chen, Lei
来源:Journal of Supercomputing, 2020, 76(6): 4041-4056.
DOI:10.1007/s11227-017-2179-3

摘要

In this paper, we propose an efficient and energy-saving distributed network architecture based on clustering stratification to solve the information security problem of unmanned aerial vehicle ad hoc network communication. And a double-authentication watermarking strategy is designed. In order to ensure that the data collected by nodes can be sent securely to the cluster head node, we use the self-characteristic of the collected data to generate the authentication watermark and insert it into the collected data at random. The cluster head node first verifies the integrity of collected data and deletes the suspicious data. Then, the authentication information is generated by combining the chaotic mapping method, and the watermark is hidden by changing the parity of the least significant bits of the data. Experimental results show that the proposed security strategy can resist most attacks, such as selective forwarding, data replay and tampering. Meanwhile, it has low energy consumption and low latency.