Font Size: a A A

The Security Of Data Transmission In Meteorological Sensor Network Based On Digital Watermarking

Posted on:2015-02-10Degree:MasterType:Thesis
Country:ChinaCandidate:J W SuFull Text:PDF
GTID:2298330467483277Subject:Meteorological information technology and security
Abstract/Summary:PDF Full Text Request
In the past few years, natural disasters have continued to change people’s life and destruction of human life and property. With more and more severe natural disasters, one important reason is that global climate warming. For example, recently in most parts of China sustained severe air pollution, making the haze serious. Therefore, we need a real-time monitoring and alarm systems to predict future weather conditions to facilitate people’s lives. Currently, the implementation of the system of wireless and networking is one of the important topics in the research field. In order to solve the existing meteorological monitoring system, cloth wired network, manual measurement and other issues. The wireless sensor network technology for a meteorological monitoring system to achieve now meteorological data network information management to improve the development of the field has important meteorological monitoring significance.Wireless sensor network applications in the field of meteorology have only just begun, its technology, networks and applications are not very mature. Therefore, the security issue in wireless sensor networks faces enormous challenges, how to take effective measures to achieve data security network is a serious problem. In order to ensure the authenticity of the data transmission network and reliability, we will study the content of information hiding technology as a wireless sensor network security issues. Therefore, this structure features a combination of wireless sensor networks in two ways to improve the security of data transmission network of meteorological sensors. One to improve the data embedded in the rules, choose a better location data embedding, and the method is also an applicable embedded algorithm in existing data; Second, based on the above embedding rules on the use of dual watermarking technology extends the watermark embedding space, to make up for the lack of data embedded space. The main contribution of the study was as follows:(1) We proposed a novel data integrity protection strategy based on fragile digital watermarking technologies, where source sensors use a one-way hash function for collecting data to create watermark information, and then makes it associated with the data by embedding it into the redundant space of the targeted bytes. At the base station side, a watermarking algorithm is designed to extract the watermarking information, which is compared to recalculated watermarking information to verify the integrity of the data during the transmission. Compare to other watermarking methods, our algorithm does not increase extra data storage space and remain data accuracy. According to the results of extensive experiments, our algorithm can effectively protect the integrity of the data and has more application values.(2) We proposed a robustness of digital watermarking algorithm based on copyright protection method with regard to data security in wireless sensor networks. According to the particular characteristics of collecting data, the embedding capacity can be expanded using this method of manipulating both LSB and MSRB[16] bits of the data field. The data-related information is embedded as the digital watermarking into the data to be forwarded. When the base station receives the data, we use a lookup table to improve the speed of data parsing. In order to achieve and verify the copyright protection on WSNs, both theoretical analysis and experimental results have demonstrated that the method can effectively verify the copyright of the data. In addition, we also generate two-dimensional code based on the test results, thereby facilitating the user’s copyright authentication and get the sensed data.
Keywords/Search Tags:Meteorological Sensor Networks, Meteorological Data Security, DigitalWatermarking, Integrity Verification, Copyright Protection
PDF Full Text Request
Related items