Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

False data identification method based on digital watermarking technology

A false data, digital watermarking technology, applied in electrical components, wireless communication, network topology and other directions, can solve the problem of MAC code misleading base station, MAC value security problem, MAC code easily damaged and other problems

Inactive Publication Date: 2012-08-22
NANJING UNIV OF POSTS & TELECOMM
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The above method has certain shortcomings while effectively detecting false data:
[0011]2. Security issues of MAC value
[0012]Since the wireless sensor network uses wireless communication for data transmission, the transmission process is easily disturbed by other conditions such as noise, so the above method proposes The received MAC code is easily damaged during transmission. Even if there is no false data attack in the network, the damaged MAC code may mislead the base station, making the base station process the correct data as false data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • False data identification method based on digital watermarking technology
  • False data identification method based on digital watermarking technology
  • False data identification method based on digital watermarking technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] specific implementation plan

[0044] The specific implementation scheme of the false data identification method based on digital watermark is as follows:

[0045] 1. In the network layout stage, it enters the normal working state after initialization;

[0046] 2. After the time of interest occurs in the sensing area, each node collects data and sends it to the cluster head node, and the cluster head node processes to obtain the fusion data;

[0047] 3. The cluster head node extracts the most significant part (MSP) of the fusion data and sends it to the nodes in the cluster together with the witness information request;

[0048] 4. After the nodes in the cluster receive the MSP of the fused data, they compare it with the data collected by themselves. If they are not similar, they do not provide witness information; The own key number is sent to the cluster head together;

[0049] 5. The cluster head node generates legal data packets until it receives t witness inform...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a false data identification method based on a digital watermarking technology. The false data identification method comprises the following steps: converging perceptual data sent by each collecting node by a cluster-head node after a network is initialized; searching identification watermark information of converged data from nodes in the cluster; processing witness watermark information provided by t witness nodes, and embedding the witness watermark information into the converged data; and after the data reaches a base station, extracting and generating witness watermarks from the received data by the base station so as to judge whether the converged data is false data or not. According to the false data identification method, the false data can be effectively identified without depending on the message authentication code (MAC) in the traditional identification method.

Description

[0001] technical field [0002] This method is a false data identification method based on digital watermark technology. It mainly solves the identification of false data in wireless sensor networks, and belongs to the field of wireless sensor network security. [0003] Background technique [0004] Wireless Sensor Networks (WSN) is a network composed of a large number of sensor nodes deployed in unattended areas for data collection and transmission. It has broad application prospects in military, environment, medical, home, industry and other aspects. The wireless sensor network is mainly centered on data, and after the nodes collect data, they must reach the base station through multi-hop transmission. In the process of data collection and transmission, it will be attacked by various aspects, and false data attack is one of them. The so-called false data attack means that the attacker captures the intra-cluster nodes in the perception area, and achieves the purpose of d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/12H04W84/18H04W12/041H04W12/06H04W12/122
Inventor 张登银程春玲许超
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products