RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      A Secure Data Transmission Scheme Based on Information Hiding in Wireless Sensor Networks

      한글로보기

      https://www.riss.kr/link?id=A100298166

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      Wireless sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments, therefore the security is a critical issue that must be resolved. In order to prevent attacks by adversaries with fake identit...

      Wireless sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments, therefore the security is a critical issue that must be resolved. In order to prevent attacks by adversaries with fake identities, we propose a secure data transmission scheme based on information hiding technique. Firstly, one superficial change made to the beacon message of original CTP is to mark the unique identity infor-mation of a sensor node. Secondly, sensitive information is uniformly and randomly embed-ded into the ordinary data by using the space-efficient randomized data structure characteris-tic of Bloom Filter. Experimental results and performance analysis demonstrate that the pro-posed scheme can efficiently detect the malicious node with fake identities through the sensi-tive information. On the other hand, our scheme can protect the sensitive information without affecting the transmission and usability of the ordinary data.

      더보기

      목차 (Table of Contents)

      • Abstract
      • 1. Introduction
      • 2. Related Works
      • 2.1. Collection Tree Protocol
      • 2.2. Information Hiding in Wireless Sensor Networks
      • Abstract
      • 1. Introduction
      • 2. Related Works
      • 2.1. Collection Tree Protocol
      • 2.2. Information Hiding in Wireless Sensor Networks
      • 2.3. Basic Principle of Bloom Filter
      • 3. Information Hiding Method
      • 3.1. The Modification to Beacon Message of CTP
      • 3.2. Pre-deployment Phase
      • 3.3. Notations and Parameters
      • 3.5. Extraction Algorithm
      • 4. Experiment and Performance Analysis
      • 4.1. Experiment Setup
      • 4.2. Experiment Results
      • 5. Conclusions and Future Works
      • Acknowledgements
      • References
      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼