Font Size: a A A

The Research On The Security Transmission Of Data In Wireless Sensor Networks

Posted on:2010-05-18Degree:MasterType:Thesis
Country:ChinaCandidate:R XiaoFull Text:PDF
GTID:2178360275482065Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The development of the micro-manufacturing technology, communication technology and the battery technology in recent years leads to that the sensor has the abilities of sensing, wireless communication and data processing, and that it can be manufactured with a low price. The sensor is therefore being widely used in many practical applications, including military and defense, environmental monitoring, traffic management, health care, manufacturing business and anti-terrorism domain. The wireless sensor network (WSN) is often large-scale and the computational and storage capabilities and energy resource of its nodes are fairly limited. Moreover, there are potential safety hazards in WSN. As a result, these arouse strong research interests of many research scholars, and many new methods, which aim to ensure the security of WSN, have been proposed.This paper is focused on the security-related problems in WSN and proposes digital watermarking-based methods to address these problems. The main contributions of this paper are as follows.1) Based on the proposed network model, this paper designs and implements a data transmission platform for WSN, which contains the five components, namely, node pre-distribution, data processing, routing, data checking and data analysis. By modifying the relevant parameters in the network system, any network topology will be generated. Similarly, by modifying the data routing methods, different transmission methods will be used to transmit the WSN data. At the base station, we detect the authenticity of sensor data and analyse the correlative data.2) Based on the proposed WSN data transmission platform, as well as the characteristics of the fragile watermarking, this paper proposes a digital watermarking method for WSN which takes full advantage of the data error. The watermark is embedded into the streaming data transmitted in the WSN and extracted at the base station. As demonstrated by the experimental results, this watermarking method does not introduce great distortion to the original data, so that the practical value of original data is guaranteed. The experiment compares the performance change before and after watermark embedding, at the same time the results prove that the algorithm can detect the authenticity of sensor data.3) In addition, depending on the proposed platform, this paper proposes a time window-based digital watermarking method for WSN. This approach makes full use of the storage format of the sending time of the data packet, digital watermarking and simple message-digest algorithm 5 (MD5) in order to ensure the security of the watermark. At the base station, if the extracted watermark is not correct, the system assumes that the packet has been tampered and thus drops it. The experiment compares the performance change before and after watermark embedding, at the same time the results can distinguish right packets from wrong packets.This paper provides new methodologies to ensure the security of WSN, and hence, its research achievements can be used to defend faking and tampering attacks. Moreover, the research made in this paper will provide a superior supporting basis for the development of the methods for the security of WSN data.
Keywords/Search Tags:digital watermarking, wireless sensor networks, data authentication, copyright protection, data detection, simulation experiment
PDF Full Text Request
Related items