Font Size: a A A

Research On The Key Technology Of WSN Data Transmission Security Based On Digital Watermarking

Posted on:2018-12-23Degree:MasterType:Thesis
Country:ChinaCandidate:K LuFull Text:PDF
GTID:2428330623950694Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The wireless sensor network arranges a large number of sensor nodes in the unmanned area,which can monitor the environment for a long time,and transmit the treated data to the base station and the user so that the user can carry out real-time and accurate monitoring of the environment.Due to hardware limitations,the sensor nodes are generally not equipped with tamper-resistant hardware devices,and it is usually deployed in the wild or harsh environment,causing it to be easily captured by attackers and transformed into malicious nodes.Malicious nodes also have private information such as legitimate keys and algorithms that are owned by normal nodes.They can use the existing secret information to work for the attacker,because the key is correct,so a simple password algorithm is difficult to identify the attack.Based on the characteristics of low energy consumption and low traffic of digital watermarking,this paper studies its application in data transmission security detection technology in wireless sensor networks.The main research contents are as follows:(1)Detection method of false data injection attack in source node.For the current solution to the problem of false data identification and filtering methods are mostly dependent on the additional MACs,which increase the amount of data transmission and energy consumption,this article uses digital watermarking instead of MACs to reduce energy consumption and improve accuracy.Based on the characteristics of spatial correlation of sensor nodes,a false data recognition and filtering algorithm based on spatiotemporal correlation and fragile reversible digital watermarking is proposed.The algorithm can realize the identification and filtering of false data on the network,and solves the problem that the existing digital watermarking method adopts the secondary transmission method to identify the false data which increase the number of data transmission in the network.Simulation experiments and comparison with other algorithms show that the method can realize the identification of false data at the hop neighbor node when the difference between the false data and the legal data reaches a certain range.(2)Detection method of selective forwarding attack initiated by intermediate nodes.Aiming at the problem that the communication overhead of existing methods is too large and the discarded data packets cannot be retransmitted,this paper proposes a asymmetric watermarking method using packet ID detection mechanism to detect and manage the selective forwarding attack initiated by intermediate nodes.The ID value and the information about the previous packet is used to generate asymmetric watermark embedded in the data packet,so that the authentication information would not be tampered or removed by the intermediate node without increasing the amount of data communication.Through the simulation experiment,it is verified that the method can detect the occurrence of the forwarding attack by about 80% even in the environment of high channel packet loss rate and malicious node packet loss rate,and can recover the discarded packet.(3)The Application of false data injection attack and selective forward attack detection.Through the asymmetric and reversible watermark embedding authentication information,the problem of data packet discarding reason is solved,so as to realize the comprehensive application of the above two methods.Through simulation experiments and comparison with other algorithms,the effectiveness of the network is analyzed,and its effectiveness is verified from the aspects of network energy consumption,data recovery rate and watermark detection rate.
Keywords/Search Tags:wireless sensor network, digital watermarking, false data injection attack detection, selective forwarding attack detection
PDF Full Text Request
Related items