Font Size: a A A

Research And Implementation Of Information Hiding Technology In IPv6-based WSNs

Posted on:2019-12-25Degree:MasterType:Thesis
Country:ChinaCandidate:R HuFull Text:PDF
GTID:2428330590965817Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of wireless sensor network technology,the IP-based wireless sensor network has become an inevitable trend in the future.At the same time,the security threats to IPv6 wireless sensor networks have become more severe because of the complex Internet environment.Protecting privacy data is an important research content of IPv6 wireless sensor network security.Since information hiding technology can achieve the invisibility of data,it plays an important role in privacy protection.Therefore,it is necessary to research information hiding technology to ensure the secure transmission of private data in IPv6 wireless sensor networks.In the light of the characteristics of IPv6 wireless sensor networks and the security requirements of data,combined with the theory of compressed sensing,an information hiding scheme for IPv6 wireless sensor networks environment is proposed in this article.The main research contents are as follows:1.A hidden key management scheme suitable for information hiding mechanism is designed.In this scheme,the establishment and update of the hidden key is mainly included,meanwhile,the one-way hash function and symmetric encryption algorithm is used to achieve hidden keys management in information hiding algorithms,thus ensuring the security and reliability of information hiding.The safety analysis shows that the scheme can achieve the forward security of the hidden key and further protect the security of the process of embedding and extraction.2.On the basis of hidden key management,a data embedding and extraction scheme based on compressed sensing is proposed.In the process of embedding,the matrix linear operation is used to embed the sensitive data into the carrier data at the end of resource-constrained sensor node,and in the process of extraction,the iterative operation is used to restore the sensitive data and carrier data at the end of resource-rich convergence node.The safety analysis shows that the confidentiality of the sensitive data is ensured and multiple types of attacks such as inversion attacks,active attacks,and passive attacks can be resisted as well.3.The extraction effect of sensitive data in wireless channels is tested on the simulation platform.The results show that the accuracy of sensitive data extraction is 94.8% when the packet loss rate is 10% and the sparsity ratio of carrier data is 17.5%,which implies the extraction accuracy is preferable.This scheme is verified by building the information hiding verification system.The test results show that this scheme can achieve the secret transmission of data and also provide confidentiality protection for data.The computational delay in the process of embedding and extraction are about 1.5 ms and 80.3 ms,respectively.The computational overhead is mainly concentrated on the resource-rich convergence node,which is suitable for the IPv6 wireless sensor network.
Keywords/Search Tags:IPv6 wireless sensor networks, privacy protection, information hiding, compressed sensing
PDF Full Text Request
Related items