期刊文献+

适用于无线传感器网络的数字水印技术 被引量:6

Digital Watermarking Technique Applied to Wireless Sensor Networks
原文传递
导出
摘要 针对无线传感器网络的数据安全问题,提出了一种适用于无线传感器网络的数字水印技术,并设计了水印的生成、嵌入和检测算法.该算法通过水印信息标识发送方节点的身份,将水印信息嵌入到节点采集的数据中进行发送,并在数据融合的过程中保留这种信息.接收方节点通过验证水印信息来判断数据的可靠性,一旦检测到了水印信息则进行存储和转发,使水印信息的数据不被丢弃.通过分析和实验验证,结果表明:该算法可以有效地验证数据的可靠性,水印信息在数据抽样和汇总中不被破坏,具有较好的可行性和实用性. In order to solve data security issues in wireless sensor networks,a digital watermarking technique applied to wireless sensor networks was proposed.And the algorithms for watermark generation,embedding and detecting were designed.According to the algorithms,the identity of the sending node was recognized by watermarking information.The watermarking information was embedded into the sent data,and was retained in the process of data aggregation.The receiving node judges the reliability of data by verifying this watermarking information.Once the watermarking information was detected,the data would be stored and transmitted.Otherwise the data would be discarded.Analysis on the security and energy consumption of the algorithms and experimental results show that these algorithms are feasible and practicable.The data reliability can be verified effectively and the watermarking information can not be destroyed in the process of sampling and summarization.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2009年第1期125-128,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(60873199)
关键词 无线传感器网络 数字水印 数据安全 嵌入 检测 wireless sensor networks digital watermarking data security embedding detecting
  • 相关文献

参考文献9

  • 1李建中,高宏.无线传感器网络的研究进展[J].计算机研究与发展,2008,45(1):1-15. 被引量:440
  • 2李建中,李金宝,石胜飞.传感器网络及其数据管理的概念、问题与进展[J].软件学报,2003,14(10):1717-1727. 被引量:620
  • 3尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099. 被引量:136
  • 4Agrawal R,Kiernan J. Watermarking Relational Databases[C]//Proceeding of the 28th VLDB Conference. Hong Kong: VLDB Press, 2002: 155-166.
  • 5Sion R,Atallah M, Prabhakar S. Rights Protection for Relational Data[C]//Proceedings of ACM SIGMOD. San Diego : ACM Press, 2003 : 98-109.
  • 6Feng J,Potkonjak M. Real-Time Watermarking Techniques for Sensor Networks[C]//SPIE Security and Watermarking of Multimedia Contents. Santa Clara: SPIE Press, 2003 : 391-402.
  • 7Sion R, Atallah M, Prabhakar S. Resilient Rights Protection for Sensor Streams[C]//Proceeding of the 30th VLDB Conference. Toronto: VLDB Press, 2004 : 732-743.
  • 8Guo Huiping, Li Yingjiu, Jajodia S. Chaining Watermarks for Detecting Malicious Modifications to Streaming Data[J]. Information Sciences, 2007,177 ( 1 ) : 281- 298.
  • 9Xiao Xiangrong, Sun Xingming, Yang Lincong,et al. Secure Data Transmission of Wireless Sensor Network Based on Information Hiding[ C ]/ / Proceedings of the Fourth Annual International Conference on Mobile and Ubiquitous Systems :Computing, Networking and Services. Philadelphia : IEEE Press, 2007 : 1-6.

二级参考文献204

共引文献1185

同被引文献64

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部