Font Size: a A A

An Energy Conserved Secure WSN Provenance Scheme Based On Inter Packets Delay Timing Channel

Posted on:2017-03-24Degree:MasterType:Thesis
Country:ChinaCandidate:L HuangFull Text:PDF
GTID:2308330509452538Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In wireless sensor networks(WSN),provenance is one of the important basis for evaluating the credibility of data. In the process of generating data packets to be transmitted to the base station(BS), provenance records all the network nodes and related operation records of the data packets. With the increasing of the data packet transmission path, the amount of provenance data will be expanded rapidly. The sensor node storage capacity and communication ability is limited, it is not a safe and complete transmission of such a large number of provenance.In view of this,the paper presents a method to transmit provenance embedded into the continuous inter packet interval(IPDs), whichcan effectively utilize the energy saving and hidden advantages of time channel.The main work of this paper includes the following:(1) In the environment of WSN continuous data stream,the provenance transmission method based on IPDs time channel is implemented, which is designed by Salmin et al., Purdue University, which can effectively utilize the channel capacity of time covert channel as well as improve the security of provenance.(2)O n this basis, according to the time interval sequence received by BS, the corresponding time interva l correction method is designed,which can effectively reduce the interference of delay jitter in the network transmission of packet interval, improve the accuracy of Provenance decoding.(3) According to the principle of DSSStechnology, the method of decoding Provenance from time channel is designed.However, due to the interference of network attacks or noise and other factors,there is a deviation between the data received by the data receiving terminal and the original data transmitted from the data source. Sowe prove that there is an optimal threshold, which can be used to minimize the error rate of decoding Provenance.(4)The time complexity and space complexity of the met hod are analyzed systematically and The security of this method is described in this paper from two aspects of internal and external attacks.(5)The feasibility and performance of the method are tested by TinyOS simulation experiment.
Keywords/Search Tags:streaming data, WSN, Provenance, continuous inter packet interval
PDF Full Text Request
Related items