计算机科学与探索 ›› 2016, Vol. 10 ›› Issue (10): 1420-1428.DOI: 10.3778/j.issn.1673-9418.1508021

• 网络与信息安全 • 上一篇    下一篇

传感器网络中基于数字水印的数据保护方案

易  昌1,朱更明1,李哲涛2+,张丹丹1   

  1. 1. 湖南科技大学 计算机科学与工程学院,湖南 湘潭 411201
    2. 湘潭大学 信息工程学院,湖南 湘潭 411105
  • 出版日期:2016-10-01 发布日期:2016-09-29

Data Protection Scheme Based on Watermarking in Sensor Network

YI Chang1, ZHU Gengming1, LI Zhetao2+, ZHANG Dandan1   

  1. 1. School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, Hunan 411201, China
    2. College of Information Engineering, Xiangtan University, Xiangtan, Hunan 411105, China
  • Online:2016-10-01 Published:2016-09-29

摘要: 针对无线传感器网络中数据传输面临的多种攻击,提出了一种基于数字水印技术的数据保护方案WSDP(watermarking scheme for data protection)。源节点首先利用哈希函数计算出感知数据的水印信息,然后根据预存密钥和处理块号,利用哈希函数生成相应处理块中的水印存储位置,最后在源数据中嵌入水印信息。基站节点在接收到数据后,提取每个处理块中嵌入的水印信息,与重新计算出的水印信息进行比较,若都能依次等同,则保持了数据完整性,否则原数据被破坏。实验表明,WSDP对选择性转发、重放、数据篡改及伪造数据包等攻击具有较高的敏感性,并且WSDP利用了字符冗余,在不增加通信量开销的情况下,增强了数据安全性和运用效果。

关键词: 无线传感器网络, 数字水印, 安全, 数据完整性

Abstract: In order to solve a variety of attacks faced by data transmission in wireless sensor networks, this paper presents a watermarking scheme for data protection (WSDP). The data from the source node are calculated as the watermark information by using the Hash function. According to the pre-stored key numbers and the processing block, and using a Hash function, a corresponding watermark storage location in processing block is generated. The watermark information is embedded in the source data. When the nodes of base station receive the data, the watermark information is    extracted from each processing block, and compared with the recalculated watermark information, if they are identical in sequence, the original data stay integrity, otherwise the data have been destroyed. The network simulation experimental results show that WSDP has high sensitivity to attacks of selective forwarding, replay, forgery, tampering and so on. Compared with other methods, WSDP using characters redundancy, without increasing extra data storage space, improves network data security to a certain extent, and has a good application of effects in the future.

Key words: wireless sensor networks, watermarking, security, data integrity