Abstract

PDF HTML阅读 XML下载 导出引用 引用提醒 WSN中基于协作水印的虚假数据过滤算法 DOI: 作者: 作者单位: 作者简介: 通讯作者: 中图分类号: 基金项目: Supported by the National Natural Science Foundation of China under Grant No.60973031 (国家自然科学基金); the Hu’nan Provincial Natural Science Foundation of China under Grant No.09JJ6097 (湖南省自然科学基金); the Scientific Research Fund of Hu’nan Provincial Education Department of China under Grant No.06B047 (湖南省教育厅优秀青年项目); the Construct Program of the Key Discipline in Hu’nan Province of China (湖南省重点建设学科项目) False Data Filtering Algorithm Using Cooperation Watermarks for WSN Author: Affiliation: Fund Project: 摘要 | 图/表 | 访问统计 | 参考文献 | 相似文献 | 引证文献 | 资源附件 | 文章评论 摘要:提出一种基于协作水印的数据认证算法来识别虚假数据和重复包,算法在每个数据包中嵌入两类水印:一类是鲁棒性水印,用于对发送者的身份和数据的新鲜性进行认证;另一类是由t个证人节点协作生成、嵌入的半脆弱水印,用于对数据内容进行认证.算法保证了多个水印之间互不影响;算法允许网络中的单个节点独立地提取水印,验证数据包的正确性,却不能伪造或修改水印.仿真和分析结果表明,算法在数据包中嵌入水印后,在大多数情况下均有较好的峰值信噪比和信噪比.同时,算法能够对恶意篡改数据具有较高的敏感性,对一定程度噪声干扰、有损压缩等具有较好的鲁棒性.算法与已有的基于MAC(message authentication code)的虚假数据过滤算法相比具有更低的通信开销和更高的识别与过滤虚假数据的能力. Abstract:In this paper, a data authenticate algorithm based on cooperation watermarks is proposed for recognition and filtering false data and replayed packets. In each packet, two kinds of watermarks are embed into data packets. One is robust watermark for the authentication of sender’s identification and the freshness of data. The other is Semi-Fragile watermark for the authentication of content generated by t witnesses. The proposed algorithm has several advantages. Firstly, different watermarks have no interaction with one another. Secondly, single sensor node can independently extract the watermark to validate data packets while nodes have no ability to modify and fabricate watermark. Theoretical and experimental results show that the algorithm has good performance in the peak value signal to noise ratio and signal to noise ratio by embedding watermarks into packets under most circumstances. And the algorithm is of high sensibility to malicious modified data, of robustness to some noise disturbance, lossy compression and so on. The new algorithm has less communication cost and more capability for the false data recognition and filtering compared with the existing algorithm based on MAC (message authentication code) schemes. 参考文献 相似文献 引证文献

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.