期刊文献+

面向无线传感网数据认证的可逆信息隐藏方案 被引量:1

Reversible data hiding scheme for authentication of Wireless Sensor Network
在线阅读 下载PDF
导出
摘要 目前已有的用于无线传感网络数据认证的可逆信息隐藏方案存在水印信息不能完全嵌入等问题。提出了一种改进的可逆信息隐藏方案。该方案采用同步点和长度控制阈值来动态划分生成分组,并依据嵌入认证信息量及嵌入策略来确定载体分组。根据无线传感网络认证的数据类型,设计了新的数据项预测方法及预测误差扩展公式。基于预测误差扩展的可逆信息隐藏算法完成认证信息的嵌入和提取。实验结果和分析表明同已有可逆信息隐藏方案及传统认证方案相比,提出方案在水印嵌入、分组划分等方面具有更好的性能。 The existing Reversible Data Hiding(RDH)schemes for the authentication of Wireless Sensor Network(WSN)have some disadvantages,for example,the watermarking cannot be embedded totally.Aiming at these disadvantages,this paper proposes an improved RDH scheme.This scheme divides dynamically the generator group using the synchronization point and the length controlling threshold,and generates the carrier group by the embedded authentication information capacity and the embedding strategy.In terms of the data types of WSN,a new method to predict the data element and a new prediction-error expansion equation are designed.Finally,the authentication information is embedded and extracted by using the RDH algorithm based on the prediction-error expansion.Experimental results and analyses demonstrate the proposed method has better performance on watermarking embedding and group division than the existing RDH schemes and traditional schemes.
作者 高光勇 尧时茂 周才学 崔宗敏 GAO Guangyong;YAO Shimao;ZHOU Caixue;CUI Zongmin(Institute of Network & Information Security, Jiujiang University, Jiujiang, Jiangxi 332005, China;School of Information Science & Technology, Jiujiang University, Jiujiang, Jiangxi 332005, China)
出处 《计算机工程与应用》 CSCD 北大核心 2017年第10期124-131,159,共9页 Computer Engineering and Applications
基金 国家自然科学基金(No.61662039 No.61362032 No.61462048) 江西省自然科学基金(No.20151BAB207003 No.20161BAB202036)
关键词 无线传感网 数据认证 可逆信息隐藏 Wireless Sensor Network(WSN) data authentication Reversible Data Hiding(RDH)
  • 相关文献

参考文献1

二级参考文献17

  • 1Li H J,Li K Q,Qu W Y,et al.Secure and Energy-efficient data Aggregation with Malicious Aggregator Identification in Wireless Sensor Networks[J].Future Generation Computer Systems,2014,37 (1):108-116.
  • 2Shi X,Xiao D.A Reversible Watermarking Authentication Scheme for Wireless Sensor Networks [J].Information Sciences,2013,240(10) :173-183.
  • 3Shim K A,Lee Y R, Park C M.EIBAS:An efficient identity-based broadcast authentication scheme in wireless sensor networks [J]. AdHoc Networks,2013,11(1):182-189.
  • 4Fan X X,Gong G.Accelerating Signature-based Broadcast Authentication for Wireless Sensor Networks [J].Ad Hoc Networks,2012,10(4):723-736.
  • 5Jr M A,Oliveira B T,Margi C B,et al.Survey and Comparison of Message Authentication Solutions on Wireless Sensor Networks [J].Ad Hoc Networks,2013,11(3):1221-1236.
  • 6Das A K,Sharma P,Chatterjee S,et al.A Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks[J].Journal of Network and Computer Applications,2012,35(5):1646-1656.
  • 7Zhang W,Liu Y H,Das S K,et al.Secure Data Aggregation in WirelessSensor Networks:a Watermark based Authentication Supportive Approach[J].Pervasive and Mobile Computing,2008,4(5):658-680.
  • 8Guo H P,Li Y J,Jajodia S.Chaining Watermarks for Detecting Malicious Modifications to Streaming Data[J].Information Sciences,2007,177(1):281-298.
  • 9Kamel IGuma H.Simplified Watermarking Scheme for Sensor Networks[J].International Journal of Internet Protocol Technology,2010 ,5(1):101-111.
  • 10Kamel I,Guma H.A Lightweight Data Integrity scheme for sensor networks[J].Sensors,2011,11(4):4118-4136.

共引文献2

同被引文献12

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部