The reliability of data protection algorithm based on check code in wireless sensor networks

In order to consider kinds of attacks faced by data transmission in wireless sensor networks, a new reliability of data protection algorithm(RDPA) was presented. With perceived data from source node, the corresponding important code is calculated by comparing with data signature. Source nodes get check number through check code algorithm, work out watermarking] using hash function, and embeds them into source data. After receiving the data, base station extracts kinds of information by the data separation algorithm. The extracted watermarking compares the recalculated., if they are equal, the source data are integral and reliable. Otherwise, the data credibility is captured by the credibility algorithm, if it better than the threshold value, we can restore data or abandon it. The experiments results show that RDPA has high sensitivity to kinds of attacks. RDPA using check code and watermarking, can accurately calculate the degree of influence, improves energy efficiency.

[1]  Xiang Yang Li,et al.  An Improved Watermarking Scheme for Secure Data Aggregation in WSNs , 2014 .

[2]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[3]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[4]  Ran Wolff,et al.  Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .

[5]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[6]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .

[7]  T. Newe,et al.  A Survey of Authentication Mechanisms: Authentication for Ad-Hoc Wireless Sensor Networks , 2007, 2007 IEEE Sensors Applications Symposium.

[8]  Ibrahim Kamel,et al.  A Lightweight Data Integrity Scheme for Sensor Networks , 2011, Sensors.

[9]  Gregory J. Pottie,et al.  Wireless integrated network sensors (WINS) , 1999, Smart Structures.

[10]  Sushil Jajodia,et al.  Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..

[11]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[12]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[13]  Xingming Sun,et al.  Multi-mark: Multiple Watermarking Method for Privacy Data Protection in Wireless Sensor Networks , 2011 .

[14]  Keqiu Li,et al.  Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks , 2011, Comput. Commun..

[15]  Ran Wolff,et al.  In-Network Outlier Detection in Wireless Sensor Networks , 2006, ICDCS.

[16]  Shen Derong Digital Watermarking Technique Applied to Wireless Sensor Networks , 2009 .

[17]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[18]  Xingming Sun,et al.  Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks , 2013 .