Journal on Communications ›› 2018, Vol. 39 ›› Issue (3): 118-127.doi: 10.11959/j.issn.1000-436x.2018046

• Papers • Previous Articles     Next Articles

Reversible digital watermarking-based protocol for data integrity in wireless sensor network

Wenxian JIANG1,Zhenxing ZHANG1,Jingjing WU2,3   

  1. 1 College of Computer Science &Technology,Huaqiao University,Xiamen 361021,China
    2 College of Mathematics &Computer Science,Quanzhou Normal University,Quanzhou 362000,China
    3 Fujian Provincial Key Laboratory of Data Intersive Computing,Quanzhou 362000,China
  • Revised:2018-02-05 Online:2018-03-01 Published:2018-04-02
  • Supported by:
    The Natural Science Foundation of Fujian Province(2017J01776);The Science and Technology Plan Key Project of Quanzhou City of Fujian Province(2017Z006)

Abstract:

For the contradiction between high energy consumption of WSN privacy protection algorithm and constrained resources of sensor network,a recoverable data fusion protocol that ensures data integrity and confidentiality based on reversible digital watermarking and homomorphic encryption technology was proposed.On the one hand,the data from the sensor was embedded by the difference expansion method by using the reversible digital watermarking technique,and original data could be recovered by using a reversible watermark to ensure the integrity check of the fusion data when the fusion data were destroyed.On the other hand,elliptic curve homomorphic encryption encrypted data to prevent sensor data from being perceived during data transmission.Security results show that the proposed protocol performs well against cluster head node compromise as well as tampering from an attack.Performance analysis shows that the protocol has significant advantages over other algorithms in terms of computation,communication overhead and propagation delay.The experimental results show that the protocol has a low resource overhead and improves network performance.

Key words: reversible digital watermarking, homomorphic encryption, integrity authentication, data recovery

CLC Number: 

No Suggested Reading articles found!