Font Size: a A A

Study On Data Authentication Scheme For Wireless Sensor Networks

Posted on:2019-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:X L KongFull Text:PDF
GTID:2428330566993532Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of the Internet of Things and smart cities,wireless sensor networks are increasingly used in healthy monitoring,industry,environment monitoring,military operations and other fields.Wireless sensor networks consist of a large number of miniature sensor nodes deployed in the monitoring area and formed by self-organizing through a wireless communication.Open channels provide opportunity for malicious attackers to inject falsified values into the wireless channels or corrupt the transmitted data.The remote monitoring area makes the node easily be captured.Therefore,making judgments about whether the received data is normal is an indispensable and challenging task.In order to authenticate the transmission data,this paper mainly completes the following works:Firstly,we analyze the time series of sensory data,reconstruct the phase space based on the chaotic theory and make predictions for the reconstructed data by RBF neural networks.A theoretical threshold is obtained by using the parameters of the phase space reconstruction.It is judged whether the data is abnormal for the first time through comparing whether the difference between the predicted and sensed values exceeds the threshold.The final judgment of abnormality is made by judging whether the number of abnormal data occurrences in the period exceeds the corresponding threshold.The proposed scheme focuses on the accuracy of data prediction and anomaly judgment.Secondly,we illustrate a reversible watermarking authentication scheme.At first,we calculate the frequency histogram of the sensed data,then set the XOR value between non-peak value and the hash value of sensed time as watermarks,at the same time embed the watermark into the peak point.The data integrity is verified by comparing whether the extracted and regenerated watermarks are equal.A lossless transmission is achieved and the data before embedding the watermark can be restored accurately in this scheme.Thirdly,we present a mutual authentication scheme before transmitting the perception data based on robust watermark.Both sides of the communicationachieve mutual authentication through three-way handshake.The authenticated party uses the information that can identify itself to generate the authentication watermark.The watermark is embedded redundantly in the payload of the authentication message.When the receiver extracts the watermark,the authentication succeed as long as the number of extracted watermark is more than half of the redundancy and equal to the regenerated watermark.This scheme focuses on simplifying the mutual authentication process,improving the robustness of watermark.
Keywords/Search Tags:Wireless sensor networks, Analysis of time series, Data authentication, Secure data transmission, Mutual authentication
PDF Full Text Request
Related items