CN102361480B - Digital watermarking method applicable to safety of data transmission of smart grid - Google Patents

Digital watermarking method applicable to safety of data transmission of smart grid Download PDF

Info

Publication number
CN102361480B
CN102361480B CN2011101788437A CN201110178843A CN102361480B CN 102361480 B CN102361480 B CN 102361480B CN 2011101788437 A CN2011101788437 A CN 2011101788437A CN 201110178843 A CN201110178843 A CN 201110178843A CN 102361480 B CN102361480 B CN 102361480B
Authority
CN
China
Prior art keywords
data item
watermark information
watermark
information
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2011101788437A
Other languages
Chinese (zh)
Other versions
CN102361480A (en
Inventor
颜昕
杜加根
吴洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University of Technology WUT
Original Assignee
Wuhan University of Technology WUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University of Technology WUT filed Critical Wuhan University of Technology WUT
Priority to CN2011101788437A priority Critical patent/CN102361480B/en
Publication of CN102361480A publication Critical patent/CN102361480A/en
Application granted granted Critical
Publication of CN102361480B publication Critical patent/CN102361480B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention relates to a digital watermarking method applicable to the safety of data transmission of a smart grid. The method comprises generation of watermarking information, embedding of the watermarking information and extraction and detection of the watermarking information. The method comprises the following steps of: based on the characteristics of the time change of an alternating current, generating the watermarking information by using the current; introducing a scale parameter u, thus obtaining a random value according to a current value, and if the obtained random value can be exactly divided by u, setting the mark bit of the watermarking information as 1; introducing a threshold value parameter P, and acquiring the watermarking information of data items which are received; if the ratio of the total amount of the data items with correct watermarking information in a data packet to the total amount of the data items with the watermarking information in the data packet is greater than P, representing that the data packet is credible, and receiving the data packet; otherwise, discarding the data packet. The method has the advantage that: on the premise of no increase of burden on network transmission data and no obvious increase of energy loss, the safety of data transmission is guaranteed.

Description

Be applied to the digital watermark method of intelligent grid data transmission security
Technical field
The invention belongs to a kind of Security Data Transmission field, particularly a kind of digital watermark method that is applied to the intelligent grid data transmission security.
Background technology
The safety of intelligent grid mainly comprises the aspects such as physical security, network security, data security and backup recovery, and wherein data security mainly refers to the authenticity of the packet that transmits in the network.The at present research for data security mainly is based on the key strategy.Key management and key algorithm have certain requirement to processor and memory.The transfer of data of intelligent grid includes spider lines and wireless sensor network, and the latter is made of a large amount of sensor nodes, and its energy and memory capacity are all very limited, so that the key strategy can not be advantageously applied to the data transmission security of intelligent grid.Digital watermark technology is the common technology of current information safety, and it is mainly used in the legitimacy protection of digital product (such as multimedia, document, software).The advantage of digital watermarking is its not outer memory space of occupying volume, as long as algorithm design gets succinctly, in wireless sensor network data safety extraordinary using value will be arranged.
Summary of the invention
The object of the invention provides a kind of digital watermark method that is applied to the intelligent grid data transmission security with the transfer of data of wireless sensor network part under the digital watermark technology solution intelligent grid, to overcome the deficiencies in the prior art.
To achieve these goals, the technical solution adopted in the present invention is:
A kind of digital watermark method that is applied to the intelligent grid data transmission security comprises the three basic aspect: extraction and the detection of the generation of watermark information, the embedding of watermark information, watermark information, and its method is:
The generation of watermark information: the characteristic that constantly changes based on alternating current, generate watermark information with electric current, for each data item in the packet that will send, key K ey and collection forward current or reverse current I constantly according to prior setting, utilize individual event hash function hsh[i]=Hash (Key, I) operation result hsh[i is got in computing] highest significant position on the Num position and the high Num position of electric current I carry out XOR, its result is as the watermark information of data item;
The generation of watermark information comprises the steps:
Step S1 if the current information of data item is forward current, then directly gathers the value of current information, turns to step S3; If current information is reciprocal electric current, then turn to step S2;
Step S2, the reciprocal current information that collects is processed, such as (current information that can avoid like this collecting repeat, and is convenient to generate diversified watermark) such as the square values that the electric current negate is enlarged simultaneously constant times or obtaining current, obtain the value of new current information;
Step S3 according to the current value of key and collection, utilizes the computing of individual event hash function, draws a cryptographic Hash;
Step S4 utilizes the binary digit of the part highest significant position of cryptographic Hash to make XOR, draws the watermark information of data item;
Step S5 is with the watermark information mark position 0 (representing that this data item is also not watermarked) of data item;
The telescopiny of watermark:
Sensor node is energy constraint, and it is loaded down with trivial details that telescopiny will be avoided, and the way of taking is only watermarked to the partial data item.Simultaneously in order farthest to guarantee the authenticity of legacy data, the embedded location of watermark is chosen in the least significant bit of core data in the data item, and the data item flag bit Flag value after watermarked is 1.
The requirement of the safe coefficient in the true occasion of the basis for selecting of partial data item, fail safe is higher, and the quantity that choose data item is larger, otherwise less.Based on this, introduce scale parameter u, its effect is the watermarked shared ratio of data item in packet of control.Be that the random function of parameter generates random number rd according to the least significant bit of the current value in key, the data item, core data, only have the rd can be watermarked by the data item that u is divided exactly.U contains the sparse degree of the data item of watermark information in packet of macroscopic view reflection, the value of u is less, and the probability that this data item is embedded into watermark is larger, otherwise then less, and when the u value was 1, data item all in the packet all added watermark.
The embedding of watermark information comprises the steps:
Step S1 produces the watermark information of data item according to the generating algorithm of watermark information;
Step S2, the highest significant position of core data in the item that fetches data;
Step S3, according to key, the current value that comprises in the data item and the value of highest significant position are utilized the random function computing, draw random value;
Step S4 if the random number of gained can be divided exactly by u, then turns to step S5; Otherwise, turn to step S6;
Step S5, some that choose least significant bit is fixed as embedding the position, embed watermark information, putting the watermark information flag bit was 1 (representing that this data item is watermarked), turned to step S6.
Step S6 reads next data item, turns to step S1;
Watermark detection process:
The flag bit Flag of each data item in the receiving node retrieve data bag, if 1 explanation contains watermark, therefore do the extraction of watermark, make legitimacy after the extraction and detect, whether the watermark information of namely relatively accepting data item equates with the watermark information that is produced by the watermark generating algorithm.If equate then illustrate that watermark does not change in the process of transfer of data, so this data item is safe.
Packet is that numerous data item forms, and network data transmission safety mainly is as unit take packet.In order to detect the safety of packet, introduce threshold parameter P, the shared ratio of secure data item in packet of its expression.The authenticity degree of all data item in its expression detected data bag on Probability.P requires artificial the setting according to the place, if data item detects legal probability greater than P, illustrates that the fail safe of packet meets the requirements, and is legal, can receive and transmit, on the contrary packet loss.
The extraction of watermark information and detection concrete steps are as follows:
Step S1, the watermark symbol position information of detection data item, if be 1, then this data item has embedded watermark, the total number that then contains the data item of watermark information in the packet increases by 1, turns to step S2; Otherwise, turn to step S6;
Step S2 obtains the watermark information (namely extracting the least significant bit of core data in the data item) of the data item that receives;
Step S3 according to data item information and key, utilizes the watermark information generating algorithm, draws watermark information;
Step S4, if the watermark information of the data item of accepting is identical with the watermark information that utilizes the watermark generating algorithm to produce, then the watermark information of this data item is correct, then the total number of the data item of correct watermark information increases by 1 in the packet, then turns to step S5; Otherwise, directly turn to step S5;
Step S5 if packet has not detected, then reads next data item, then turns to S1; Otherwise turn to S6;
Step S6 if the ratio of total number of data item that contains watermark information in the packet in the total number of the data item of correct watermark information and the packet represents that greater than P this packet is credible, then accepts this packet, otherwise, abandon this packet.
Compared with prior art, the present invention's digital watermark method of being applied to the intelligent grid data transmission security has following advantage:
(1) is applied to the digital watermark technology of intelligent grid, can guarantees that the data that the transducer in the electrical network receives are initial data that sensor node sends, be not maliciously tampered, guaranteed the safety of transfer of data.
(2) digital watermark method utilizes the most unessential data division in the watermark information replacement vector information, just displacement, the extra data that add on the legacy data basis so digital watermark technology can keep the throughput of legacy network preferably, do not increase the burden of transmitted data on network.
(3) digital watermarking algorithm makes every effort to succinct in realization, at most only used the individual layer circulation, its complexity is relevant with the data item of the disposable transmission of node, sensor node is when processing the generation of watermark, embedding, extraction and detection, can not increase significantly the loss of energy, therefore, digital watermark technology can adapt to the limited restriction of WSN node energy preferably.
Description of drawings
Fig. 1 is flow chart of the present invention.
Fig. 2 is data packet format schematic diagram of the present invention.
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples.
The present invention utilizes alternating current generating watermark information, is a vector on the alternating current physics, and it has the attribute of two keys: size and direction, electric current I are the monotropic functions of time T, and namely electric current is unique in one-period; Sending node embeds watermark in the data item that gathers, and then is stored in the memory Buffer of node, when Buffer is full, is a data packet generation also, and it is transmitted in network; Receiving node key and relevant parameter according to the rules detects extraction and the legitimacy that packet carries out watermark.Watermark extracting method is the Flag of the data item of retrieval collection, if very then extract watermark, no person does not do any operation.Method of detecting watermarks is whether relatively extract the watermark information of data item consistent with the watermark information of generation, if consistent, this data item thinks legal, when the data item of some is all legal, this packet is effectively, and then can transmit, otherwise then think the invalid data bag, do discard processing.
The present invention includes the three basic aspect: extraction and the detection of the generation of watermark information, the embedding of watermark information, watermark information:
The generation of watermark information: the characteristic that constantly changes based on alternating current, generate watermark information with electric current, periodicity characteristics (although the electric current direction in different moment difference in view of electric current, but might equate on the numerical value), in order to make watermark have variation, before watermark generates, can carry out special processing to reverse current, enlarge a multiple such as numerical value, and then deduct a constant.
The detailed process that watermark generates is described as: for each data item in the packet that will send, according to key and collection forward current (reverse current after perhaps processing) constantly, utilize the computing of individual event hash function, obtain the operation result cryptographic Hash, get the partial binary position from the highest significant position of cryptographic Hash and make XOR, its result is as the watermark information of data item;
The generation of watermark information comprises the steps:
Step S1 if the current information of data item is forward current, then directly gathers the value of current information, turns to step S3; If current information is reciprocal electric current, then turn to step S2;
Step S2 processes the reciprocal current information that collects (current information of avoiding collecting repeats, and is convenient to generate diversified watermark), obtains the value of new current information;
Step S3 according to the current value of key and collection, utilizes the computing of individual event hash function, draws a cryptographic Hash;
Step S4 utilizes the binary digit of the part highest significant position of cryptographic Hash to make XOR, draws the watermark information of data item;
Step S5 is with the watermark information mark position 0 (representing that this data item is also not watermarked) of data item.
(1) telescopiny of watermark
Sensor node is energy constraint, and it is loaded down with trivial details that telescopiny will be avoided, and the way of taking is only watermarked to the partial data item.Simultaneously in order farthest to guarantee the authenticity of legacy data, the embedded location of watermark is chosen in the least significant bit of core data in the data item, and the data item flag bit Flag value after watermarked is 1.
The requirement of the safe coefficient in the true occasion of the basis for selecting of partial data item, fail safe is higher, and the quantity that choose data item is larger, otherwise less.Based on this, algorithm is introduced scale parameter u, and its effect is the watermarked shared ratio of data item in packet of control.Be that the random function of parameter generates random number rd according to the least significant bit of the current value in key, the data item, core data, only have the rd can be watermarked by the data item that u is divided exactly.U contains the sparse degree of the data item of watermark information in packet of macroscopic view reflection, the value of u is less, and the probability that this data item is embedded into watermark is larger, otherwise then less, and when the u value was 1, data item all in the packet all added watermark.
The embedding of watermark information comprises the steps:
Step S1 produces the watermark information of data item according to the generating algorithm of watermark information;
Step S2, the highest significant position of core data in the item that fetches data;
Step S3, according to key, the current value that comprises in the data item and the value of highest significant position are utilized the random function computing, draw random value;
Step S4 if the random number of gained can be divided exactly by u, then turns to step S5; Otherwise, turn to step S6;
Step S5, some that choose least significant bit is fixed as embedding the position, embed watermark information, putting the watermark information flag bit was 1 (representing that this data item is watermarked), turned to step S6.
Step S6 reads next data item, turns to step S1;
(2) watermark detection process
Watermark detection process is such: the flag bit Flag of each data item in the receiving node retrieve data bag, if 1 explanation contains watermark, therefore do the extraction of watermark, make legitimacy after the extraction and detect, whether the watermark information of namely relatively accepting data item equates with the watermark information that is produced by the watermark generating algorithm.If equate then illustrate that watermark does not change in the process of transfer of data, so this data item is safe.
Packet is that numerous data item forms, and network data transmission safety mainly is as unit take packet.In order to detect the safety of packet, introduce threshold parameter P, the shared ratio of secure data item in packet of its expression.The authenticity degree of all data item in its expression detected data bag on Probability.P requires artificial the setting according to the place, if data item detects legal probability greater than P, illustrates that the fail safe of packet meets the requirements, and is legal, can receive and transmit, on the contrary packet loss.
The extraction of watermark information and detection concrete steps are as follows:
Step S1, the watermark symbol position information of detection data item, if be 1, then this data item has embedded watermark, the total number that then contains the data item of watermark information in the packet increases by 1, turns to step S2; Otherwise, turn to step S6;
Step S2 obtains the watermark information (namely extracting the least significant bit of core data in the data item) of the data item that receives;
Step S3 according to data item information and key, utilizes the watermark information generating algorithm, draws watermark information;
Step S4, if the watermark information of the data item of accepting is identical with the watermark information that utilizes the watermark generating algorithm to produce, then the watermark information of this data item is correct, then the total number of the data item of correct watermark information increases by 1 in the packet, then turns to step S5; Otherwise, directly turn to step S5;
Step S5 if packet has not detected, then reads next data item, then turns to S1; Otherwise turn to S6;
Step S6 if the ratio of total number of data item that contains watermark information in the packet in the total number of the data item of correct watermark information and the packet represents that greater than P this packet is credible, then accepts this packet, otherwise, abandon this packet.
Detailed process of the present invention is:
(1) form of packet of the present invention as shown in Figure 2
Format description to packet is as follows:
Packet=(Head,Send-Data)
Head: the head of packet comprises the fix informations such as route, data type, data packet length.
Send-Data: being the data content of acquisition node one less important transmission, also is the data content of Buffer when filling
The form of Send-Data is as follows:
Send-Data=(Data[1],Data[2]...Data[m]),Data[i](i=1...m)
The data item that gathers in expression one or more cycles of sensing node.
Data[i] form abstract as follows:
Typedef?struct?Data_info
I: the electric current in the moment that a data item gathers is vector, and existing size has again direction;
Kernal_data: core data also is protected data;
The Flag:Bool value represents whether this data item has watermark, and having then is 1, otherwise 0;
(2) watermark information generating algorithm
The generative process of watermark is based on that individual data item among the Send-Data carries out, generating algorithm will be used the parameter of two keys: key K ey and data item collection electric current I constantly, the Hash function of utilization extensive extensive application in cryptography and the communications field carries out computing hsh[i to Key and I]=Hash (Key, Data[i] .I), the then as a result hsh[i from obtaining] ask highest significant position, then get partial binary position and the current value of highest significant position and make XOR, thereby generate Data[i] watermark information w[i], the watermark state flag bit Flag of last initialization data item is 0.
(3) the embedding algorithm of watermark information
For the purpose of minimum degree ground change data, only watermarked to the data least significant bit.The corresponding watermark that utilizes the watermark generating algorithm to generate, only watermarked to the fixed bit of the least significant bit of data item, the data item flag bit Flag value after watermarked is 1.
The requirement of the safe coefficient in the true occasion of the basis for selecting of least significant bit, fail safe is higher, and the quantity that choose data item is larger, otherwise less.Based on this, introduce scale parameter u, its effect is the watermarked shared ratio of data item in packet of control.Be that the random function of parameter generates random number rd according to the electric current I in key K ey, the data item, least significant bit Msb-Data, only have the rd can be watermarked by the data item that u is divided exactly.U contains the sparse degree of the data item of watermark information in packet of macroscopic view reflection, the value of u is less, and the probability that this data item is embedded into watermark is larger, otherwise then less, and when the u value was 1, data item all in the packet all added watermark.
(4) watermark detection algorithms
The packet of receiving node has consistent structure with the packet of sending node on the network, the purpose of setting forth for convenience, with Packet-R=(Head, Receive-Data) represent the packet that node receives, the Receive-Data structure is same as Send-Data, also be to be consisted of by numerous data item, comprise the data item of embed watermark information and the data item of embed watermark information not.The mechanism of watermark detection is such: each data item of Receive-Data is read in the receiving node circulation, retrieve simultaneously the Flag value of each data item, with it and 1 make comparisons, if Flag equals 0, illustrate that this data item is not with watermarked information, therefore also do not do extraction and the detection of watermark; If Flag equals 1, represent that this data item contains watermark information, and then from this data item, extract watermark information WM`, with itself and WM=Generate-W (Receive-Data[i], Key, Num) make comparisons, if relation of equality, then illustrating in this data item transmission course and polluted, is safe.
The content that is not described in detail in this specification belongs to the known prior art of this area professional and technical personnel.

Claims (1)

1. a digital watermark method that is applied to the intelligent grid data transmission security comprises the generation of watermark information, the embedding of watermark information, three parts of extraction and detection of watermark information, and its method is:
The generation of watermark information: the characteristic that constantly changes based on alternating current, generate watermark information with electric current, for each data item in the packet that will send, key K ey and collection forward current or reverse current I constantly according to prior setting, utilize individual event hash function hsh[i]=Hash (Key, I) operation result hsh[i is got in computing] highest significant position on the Num position and the high Num position of electric current I carry out XOR, its result is as the watermark information of data item;
Concrete steps are:
If the current information of S11 data item is forward current, then directly gather the value of current information, turn to step S13; If current information is reciprocal electric current, then turn to step S12;
S12, the reciprocal current information that will collect are processed, and obtain the value of new current information;
S13, according to the current value of key and collection, utilize the computing of individual event hash function, draw a cryptographic Hash;
S14, utilize the binary digit of the part highest significant position of cryptographic Hash to make XOR, draw the watermark information of data item;
S15, with the watermark information mark position 0 of data item;
The embedding of watermark information: introduce scale parameter u, the effect of scale parameter u is the shared ratio of data item of embed watermark information in packet of control,
The embedding of watermark information comprises the steps:
Step S21 produces the watermark information of data item according to the generating algorithm of watermark information;
Step S22, the highest significant position of core data in the item that fetches data;
Step S23, according to key, the current value that comprises in the data item and the value of highest significant position are utilized the random function computing, draw random value;
Step S24 if the random number of gained can be divided exactly by u, then turns to step S25; Otherwise, turn to step S26;
Step S25, some that choose least significant bit is fixed as embedding the position, embed watermark information, putting the watermark information flag bit is 1, turns to step S26.
Step S26 reads next data item, turns to step S21;
The extraction of watermark information and detection: introduce threshold parameter P, the shared ratio of secure data item in packet of its expression;
The extraction of watermark information and detection concrete steps are as follows:
The watermark symbol position information of step S31, detection data item, if be 1, then this data item has embedded watermark, the total number that then contains the data item of watermark information in the packet increases by 1, turns to step S32; Otherwise, turn to step S36;
Step S32, obtain the watermark information of the data item that receives;
Step S33, according to data item information and key, utilize the watermark information generating algorithm, draw watermark information;
If the watermark information of the data item that step S34 accepts is identical with the watermark information that utilizes the watermark generating algorithm to produce, then the watermark information of this data item is correct, and then the total number of the data item of correct watermark information increases by 1 in the packet, then turns to step S35; Otherwise, directly turn to step S35;
If step S35 packet has not detected, then read next data item, then turn to S31; Otherwise turn to S36;
Step S36 if the ratio of total number of data item that contains watermark information in the packet in the total number of the data item of correct watermark information and the packet represents that greater than P this packet is credible, then accepts this packet, otherwise, abandon this packet.
CN2011101788437A 2011-06-29 2011-06-29 Digital watermarking method applicable to safety of data transmission of smart grid Expired - Fee Related CN102361480B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101788437A CN102361480B (en) 2011-06-29 2011-06-29 Digital watermarking method applicable to safety of data transmission of smart grid

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101788437A CN102361480B (en) 2011-06-29 2011-06-29 Digital watermarking method applicable to safety of data transmission of smart grid

Publications (2)

Publication Number Publication Date
CN102361480A CN102361480A (en) 2012-02-22
CN102361480B true CN102361480B (en) 2013-03-20

Family

ID=45586735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101788437A Expired - Fee Related CN102361480B (en) 2011-06-29 2011-06-29 Digital watermarking method applicable to safety of data transmission of smart grid

Country Status (1)

Country Link
CN (1) CN102361480B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843588A (en) * 2012-09-29 2012-12-26 金纯� Method and system for intrusion detection for CMMB (China Mobile Multimedia Broadcasting) play system based on watermark technology
CN104486304B (en) * 2014-12-04 2017-08-04 湖南科技大学 A kind of wireless sensor network data method for security protection based on digital watermarking
CN106919813A (en) * 2015-12-25 2017-07-04 中国电信股份有限公司 Big data watermark management method and system
CN112418861A (en) * 2020-12-07 2021-02-26 江南大学 Node rapid consensus method applied to industrial Internet of things
CN115134137B (en) * 2022-06-23 2024-02-09 蚂蚁区块链科技(上海)有限公司 Data transmission method, device, computer readable storage medium and equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101742501A (en) * 2010-01-15 2010-06-16 南京邮电大学 Safe multi-channel media access control method of wireless self-organizing network
CN101777792A (en) * 2009-12-24 2010-07-14 深圳先进技术研究院 Safety communication system and method of electric network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7417962B2 (en) * 2004-09-15 2008-08-26 Alcatel Lucent QoS capable mobile ad-hoc network device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777792A (en) * 2009-12-24 2010-07-14 深圳先进技术研究院 Safety communication system and method of electric network
CN101742501A (en) * 2010-01-15 2010-06-16 南京邮电大学 Safe multi-channel media access control method of wireless self-organizing network

Also Published As

Publication number Publication date
CN102361480A (en) 2012-02-22

Similar Documents

Publication Publication Date Title
CN102361480B (en) Digital watermarking method applicable to safety of data transmission of smart grid
Wang et al. A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things.
CN104486304B (en) A kind of wireless sensor network data method for security protection based on digital watermarking
CN102355382A (en) Method for analyzing and triggering controller area network (CAN) bus
JP2005295543A (en) Method and system of transmitting data in network including sensor node
CN101834899A (en) Distributed adaptive coding and storing method
CN102176777B (en) Method for transmitting sensitive information in wireless sensor network
CN110533572A (en) A kind of watermark embedding method, system and relevant apparatus
CN109313841A (en) For realizing the method and system of self-adaption cluster in sensor network
Wang et al. A copyright protection method for wireless sensor networks based on digital watermarking
CN110034928A (en) Energy measurement information transmitting device and method
Ren et al. A sensitive data aggregation scheme for body sensor networks based on data hiding
Ding et al. A reversible watermarking scheme based on difference expansion for wireless sensor networks
CN106373363B (en) Electric energy meter wireless kilowatt meter reading-out system
CN107466057A (en) A kind of WSN collecting methods based on region-growing method
Dong et al. An authentication method for self nodes based on watermarking in wireless sensor networks
Wang et al. A secure reversible chaining watermark scheme with hidden group delimiter for WSNs
Wang et al. An energy conserving reversible and irreversible digital watermarking hybrid scheme for cluster-based wireless sensor networks
Yan et al. The digital watermarking used to the smart power grid security
CN202068579U (en) Sensor node in wireless sensor network
CN102946393A (en) Safety communication method applied to wireless multimedia sensor network
Yang et al. Bloom filter-based data hiding algorithm in wireless sensor networks
CN202095096U (en) Sensitive information transmission system in wireless sensor network
CN102739555B (en) Data transmission method and data interface card
CN202068576U (en) Base station in wireless sensor network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130320

Termination date: 20150629

EXPY Termination of patent right or utility model