Unlock instant, AI-driven research and patent intelligence for your innovation.

Forwarding-attack-resistance method based on digital watermarking

A technology for digital watermarking and watermark extraction, applied in electrical components, wireless communication, network topology, etc., can solve the problem of inability to effectively detect malicious nodes tampering with data content, and achieve the effect of improving security

Inactive Publication Date: 2012-01-11
NANJING UNIV OF POSTS & TELECOMM
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009]Technical problem: the present invention is mainly aimed at the characteristics of selective forwarding attacks, and improves the existing solutions that cannot effectively detect malicious nodes tampering with data content, and introduces digital Watermarking technology to protect data integrity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Forwarding-attack-resistance method based on digital watermarking
  • Forwarding-attack-resistance method based on digital watermarking
  • Forwarding-attack-resistance method based on digital watermarking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] specific implementation plan

[0053] Taking the existence of a selective forwarding attack node in the transmission path as an example, the following is a specific implementation plan of the present invention:

[0054] (1) The source node collects the original data, the length of which is l , divide the data into c groups, each group of data is recorded as L[i], i =0,1... c ;

[0055] (2) Generate watermark information:

[0056] a) Calculation key K The hash value of is denoted as Hash(K);

[0057] b) take c data packet L[ i ] The most significant bit, denoted as C[ i ]( i =0,1... c );

[0058] c) take Hash(K) before c bit, denoted as H[ i ] ( i =0,1... c );

[0059] d) Calculate the watermark information W, W[ i ]= H[ i ] C[ i ] ( i =0,1... c ), is an XOR operation.

[0060] (3) Embed watermark information into each group:

[0061] f) Get grouped i The data L[ i ];

[0062] g) If W[ i ] is 0, then it is wrong for L[ i ] for proce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a forwarding-attack-resistance method based on the digital watermarking. The abandoned rate and the tampered rate of data in the transmission process are obtained through carrying out watermarking embedding at a source node and extracting the watermarking information at a base station part, and then, the comparison with the data packet loss in a secure network is carried out for judging whether a selective forwarding attack node exits in a transmission path or not; and malicious node detection and elimination is carried out when the base station judges that malicious nodes exist in the transmission path. When the detection method provided by the invention is adopted, the random data packet loss behavior of the malicious node can be judged, simultaneously, the malicious node is detected and eliminated, and the network security is improved.

Description

[0001] technical field [0002] The method relates to a digital watermark-based anti-forwarding attack method. It mainly solves the detection of selective forwarding attacks and the exclusion of malicious nodes in wireless sensor networks, and belongs to the field of wireless sensor network security. Background technique [0003] Wireless Sensor Networks (WSN) is a network composed of a large number of sensor nodes deployed in unattended areas for data collection and transmission. It has broad application prospects in military, environment, medical, home, industry and other aspects. The wireless sensor network is mainly centered on data, and after the nodes collect data, they must reach the base station through multi-hop transmission. During the data transmission process, it will be attacked by various parties, and the selective forwarding attack is one of them. The so-called selective forwarding attack means that the attacking node receives the data sent by the neighbor n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/10H04W12/12H04W84/18H04W12/122
Inventor 张登银许超程春玲邹志强刘林峰
Owner NANJING UNIV OF POSTS & TELECOMM