通信学报 ›› 2018, Vol. 39 ›› Issue (3): 118-127.doi: 10.11959/j.issn.1000-436x.2018046

• 论文Ⅱ:学术论文 • 上一篇    下一篇

基于可逆数字水印认证的无线传感网数据融合协议

蒋文贤1,张振兴1,吴晶晶2,3   

  1. 1 华侨大学计算机科学与技术学院,福建 厦门 361021
    2 泉州师范学院数学与计算机科学学院,福建 泉州 362000
    3 福建省大数据管理新技术与知识工程重点实验室,福建 泉州362000
  • 修回日期:2018-02-05 出版日期:2018-03-01 发布日期:2018-04-02
  • 作者简介:蒋文贤(1974-),男,福建漳州人,华侨大学副教授,主要研究方向为物联网安全、网络协议等。|张振兴(1991-),男,黑龙江双鸭山人,华侨大学硕士生,主要研究方向为网络安全、隐私保护技术等。|吴晶晶(1975-),女,福建漳州人,博士,泉州师范学院教授,主要研究方向为无线传感器网络、数据挖掘和大数据管理和分析等。
  • 基金资助:
    福建省自然科学基金资助项目(2017J01776);福建省泉州市科技计划基金资助项目(2017Z006)

Reversible digital watermarking-based protocol for data integrity in wireless sensor network

Wenxian JIANG1,Zhenxing ZHANG1,Jingjing WU2,3   

  1. 1 College of Computer Science &Technology,Huaqiao University,Xiamen 361021,China
    2 College of Mathematics &Computer Science,Quanzhou Normal University,Quanzhou 362000,China
    3 Fujian Provincial Key Laboratory of Data Intersive Computing,Quanzhou 362000,China
  • Revised:2018-02-05 Online:2018-03-01 Published:2018-04-02
  • Supported by:
    The Natural Science Foundation of Fujian Province(2017J01776);The Science and Technology Plan Key Project of Quanzhou City of Fujian Province(2017Z006)

摘要:

针对无线传感网隐私保护协议的高能耗与传感网络资源受限的对立问题,基于可逆数字水印与同态加密技术,提出一种同时保证数据完整性与机密性的可恢复数据融合协议。一方面采用可逆数字水印技术中的差异扩展方法对传感器采集数据进行嵌入,在融合数据被破坏时可以通过可逆水印恢复原始数据,保证融合数据的完整性校验;另一方面采用基于椭圆曲线的同态加密对数据进行加密融合,防止在数据传输过程中传感器数据被感知。安全推理表明,所提协议可以很好地抵御簇头节点妥协和篡改攻击。性能分析表明,该协议比其他算法在计算与通信开销、传输时延方面具有显著优势。实验对比结果表明,该协议有更低的资源开销,可以提升网络性能。

关键词: 可逆数字水印, 同态加密, 完整性校验, 数据恢复

Abstract:

For the contradiction between high energy consumption of WSN privacy protection algorithm and constrained resources of sensor network,a recoverable data fusion protocol that ensures data integrity and confidentiality based on reversible digital watermarking and homomorphic encryption technology was proposed.On the one hand,the data from the sensor was embedded by the difference expansion method by using the reversible digital watermarking technique,and original data could be recovered by using a reversible watermark to ensure the integrity check of the fusion data when the fusion data were destroyed.On the other hand,elliptic curve homomorphic encryption encrypted data to prevent sensor data from being perceived during data transmission.Security results show that the proposed protocol performs well against cluster head node compromise as well as tampering from an attack.Performance analysis shows that the protocol has significant advantages over other algorithms in terms of computation,communication overhead and propagation delay.The experimental results show that the protocol has a low resource overhead and improves network performance.

Key words: reversible digital watermarking, homomorphic encryption, integrity authentication, data recovery

中图分类号: 

No Suggested Reading articles found!