传感器网络中基于数字水印的安全数据收集机制
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络在军事和民用领域蕴含着巨大的应用前景。但无线传感器网络通常部署在危险甚至敌对的环境中,节点容易被攻击俘获而妥协,攻击者可通过妥协节点向网络中灌注大量的虚假数据,这不仅影响感知数据的准确性,还会干扰用户决策,甚至会使得网络变得不可信。因此如何有效地设计一种安全的数据收集协议已成为人们亟待解决的问题。本文围绕着如何确保传感器网络所采集的数据具有安全可靠的问题进行深入研究,主要工作包括以下几个方面:
     (1)提出一种基于协作水印的虚假数据识别与过滤算法。首先,本文提出了一种协作水印模型。在协作水印模型中,一个数据包被嵌入两类不同目的的水印:一类用于识别发送者身份与数据新鲜性属于鲁棒性水印:另一类是半脆弱水印,用于对数据的内容认证,该水印是由t个证人节点生成、协同嵌入的。协作水印模型不仅可保证水印之间互不影响而且可允许中转节点独立地提取水印却难以篡改水印。然后,进一步提出了基于协作水印的虚假数据过滤算法,仿真和理论分析表明,协作水印模型能使得嵌入水印的数据包有较好的峰值信噪比和信噪比;同时算法能对恶意篡改数据具有较高的敏感性,对一定程度噪声干扰、有损压缩等具有较好的鲁棒性。算法与已有的基于MACs(Message Authentication Codes)的虚假数据过滤算法相比具有更低的通信开销和更高的识别与过滤虚假数据的能力。
     (2)提出了一种基于分布式多重半脆弱水印的虚假数据识别与过滤算法。首先,我们结合传感器网络节点分簇协作聚合和节点协同工作的特点,提出了一种分布式的多重半脆弱水印模型。该模型由多个证人节点共同产生水印共同嵌入水印,但一个节点可以独立提取一个认证节点产生的水印。该模型具有复杂度低能有效抵抗单个节点被俘获而失效的特点。在分布式多重半脆弱水印基础上,我们进一步提出了虚假数据过滤算法,该算法利用水印进行认证,从而判断数据包的正确性、完整性与新鲜性,无需利用MACs认证。理论分析和仿真表明,新的算法与已有基于MACs认证的虚假数据过滤算法相比,不仅过滤虚假数据的能力强,通信开销低,而且具有“鲁棒但脆弱”的特性,能支持网内有损数据处理和抵抗一定的噪声干扰。
     (3)提出了一种基于交织水印的抗丢包的图像采集算法。视觉传感器网络具有较高的QoS需求,网络具有传感失谐等特性,传统的QoS保障机制不适合视觉传感器网络。为此,本文结合视觉传感器网节点间协同工作的特点,提出了一种网内多节点协作的交织嵌入的交织水印技术,以实现图像子块搭载其它子块的水印信息,不同于以往的差错控制技术需要附加差错控制码或冗余传输;Sink收集到图像后,可利用水印信息对图像受损区域进行恢复和重建,从而有效地提高用户采集图像的质量。本文的算法与目前的差错控制技术相比,不仅通信开销小,且具有良好的丢包容忍能力,更适用于视觉传感器网络。
     (4)在两层结构传感器网络当中,存储节点既负责网内数据的存储又负责处理Sink的查询,因而变得更易遭受攻击者的攻击。一个妥协的存储节点不仅可能泄露传感器所采集的敏感数据,而且会向Sink回复不完整的或虚假的查询结果。为此,本文提出一种安全范围查询协议QuerySec,QuerySec在保证存储节点能正确执行查询的同时能有效防止敏感数据与查询条件的泄露。为了保护数据的隐私性,我们提出了一种基于二元函数的隐私保护方案,该方案利用隐私保护函数与查询函数对节点采集的数据范围信息和查询条件进行加密,保证存储节点在不知道数据和查询条件真实内容的情况下正确地执行查询处理。为了保护查询结果的完整性,我们提出了一种称之为链式水印的方案,该方案能有效检测查询结果的完整性。此外,当Sink没有接收到某个节点的数据时,我们提出了能区分节点失效还是存储节点恶意行为的方法。
Wireless sensor networks hold a great prospect in the field of military and civilian, but they are usually deployed in the dangerous or even hostile environment, which make them prone to be attacked and compromised. In particular attackers may inject false data into a sensor network through those compromised sensor nodes within the network, which will compromise the accuracy of the data items collected by all sensor nodes, or interfere the user decision-making, or let the network system unreliable. Therefore, how to design secure protocols for data collection in wireless sensor networks is regarded as an important unsolved issue. In this thesis we focus on the problem that how to ensure the safety and reliability of sensor collected data. The main research work includes the following:
     (1) We propose a cooperative watermark scheme to recognize and filter the false data. Firstly, we propose a cooperative watermark mode under which each data packet will be with two kinds of watermark embedded, one is robust watermark for the identification of the sender and freshness authentication of the data items; the other is the so called Semi-Fragile watermark for the authentication of the data content, which is generated by the t witness nodes. This cooperative watermark mode holds several distinguishing merits. First, different watermarks will do not interfere with each other; Second, each sensor can extract the watermark embedded in its packets to verify the correctness of the packet while cannot modify or fabricate the watermark. Based on it we propose a cooperative watermark based operation algorithm for authenticating and filtering the false data. Both the theoretical analysis and experimental results show that, by embedding watermark into the data items'our algorithm can achieve good performance in both the peak signal to noise ratio and signal to noise ratio in most cases. Meanwhile, this algorithm is highly sensitive to malicious modification on the data and holds good robustness to noise interference and lossy compression. Compared with the existing MACs (Message Authentication Code) based filter algorithms, our algorithm consumes a lower communication overhead and achieves a higher efficiency for recognizing and filtering false data.
     (2) We propose a distributed multiple semi-fragile watermarks algorithm for recognizing and filtering the false data. Firstly, according to the fact in sensor networks that sensors in one cluster will be collaborative with each other to aggregate and transmit data items, we propose a distributed multiple semi-fragile watermarks algorithm, under which the watermark generation, embedding and extraction are accomplished by multiple witness nodes in a cooperative manner instead of the self-manner. Such a kind of algorithm can save the energy consumption and also prevent revealing those secret keys in case a single sensor is compromised. Based on it we propose a distributed multiple semi-fragile watermarks algorithm for filtering false data. This algorithm authenticates the accuracy, integrity and freshness for the data packets using watermarks instead of MACs. Compared with the existing filtering algorithms based on MACs, our algorithm has a better capability for filtering false data, and consumes less communication energy, and holds the advantage of "robust, yet fragile", and also supports intra-network lossy data processing and partly resists the noise interference.
     (3) Visual Sensor Networks (VSN) has a high QoS demand, but the traditional QoS guarantee mechanism is not applicable to the VSN as the VSN holds the special features such as mismatch between its transmission and sensing. In this respect, based on the fact of VSN that sensors in it are collaborative in their work, we propose a sensor node cooperating based interleaving embedding and watermark technology, so that the sub-blocks in an image can carry the watermark information of other sub-blocks, which is different from the previous error control techniques under which the error control code or redundant transmission data is added. After receiving images, sink could recover or restore damaged regions of images using the watermark information so as to improve the quality of collected images. Compared with the previous error control techniques, this algorithm is more suitable for VSN in that it can save the communication cost and also hold better tolerance for packet loss.
     (4) In two-tiered sensor networks, storage nodes are more prone to be attacked than sensors as they are in charge of storing collected data and also processing queries issued by the sinks. A compromised storage node will not only reveal the sensitive data collected by the sensors, but also answer the incomplete or false query results. We propose a so called QuerySec scheme, a protocol which enables storage nodes to process queries correctly while prevents them from revealing the sensitive data and queries. To protect privacy, we propose a privacy preserving scheme based on two-variable polynomail function in which both the sensor collected data and the sink issued queries are encoded by polynomail function, which enables storage nodes to process queries correctly without knowing the actual values of both data and queries. To preserve integrity, we propose a link watermarking scheme, in which data items are formed into a link structure via the watermarks embedded in them so that any deletion in the query results can be detected. In addition, we propose a method which allows the sink to distinguish failure of the sensors from storage node misbehavior when the sink does not receive any data from a sensor.
引文
[1]任丰原,黄海宁,林闯.无线传感器网络.软件学报,2003,14(7):1282-1291.
    [2]李建中,李金宝,石胜飞.传感器网络及其数据管理的概念、问题与进展.软件学报,2003,14(10):1717-172.
    [3]马组长,孙怡宁,梅涛.无线传感器网络综述.通信学报,2004,25(4):114-124.
    [4]崔莉,鞠海玲,苗勇.无线传感器网络研究进展.计算机研究与发展,2005,42(1):163-174.
    [5]唐勇,周明天,张欣.无线传感器网络路由协议研究进展.软件学报,2006,17(3):422-433.
    [6]孙利民,李建中,陈渝,朱红松著.无线传感器网络.北京:清华大学出版社,2005.
    [7]Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks:a survey. IEEE Communications Magazine,2002,40(8):102-114
    [8]Asada G, Pottie G J, Kaiser W J, et al. Wireless integrated network sensors. Communications of the ACM,2000,43(5):51-58
    [9]Chong C, Kumar S. Sensor networks:Evolution, opportunities, and challenges. Distributed Wireless Sensor Networks,2003,91 (16):124-125.
    [10]Ganessan. Strategic Analysis.http://www.sainc.com/sensit,2010-03-05
    [11]郝文江,武捷.物联网技术安全问题探析.信息网络安全,2010,(1):49-50.
    [12]武汉科技大学论坛http://bbs.wust.cc/thread-2282-1-1.html
    [13]李平,林亚平,曾玮妮.传感器网络安全研究(英文).软件学报,2006,17(12):2577-2588.
    [14]张起元.无线传感器网络虚假数据检测排除机制研究[博士学位论文].中国科学技术大学,2010.
    [15]杨峰,周学海,张起元等.无线传感器网络恶意节点溯源追踪方法研究.电子学报.2009,37(1):202-206.
    [16]孙利民,李建中,陈渝等.无线传感器网络.北京:清华大学出版社,2005
    [17]RICE. WINS:Wireless Integrated network sensors, http://www.janet.ucla.edu/WINS,2007-05-12
    [18]于海斌,曾鹏,梁铧.钾能无线传感器网络系统.北京:科学出版社,2006
    [19]宋光明,葛运建.智能传感器网络研究与发展.传感技术学报,2003,(2):107-112
    [20]胡向东,邹洲等.无线传感器网络安全研究综述.仪器仪表学报,2006,27(6):307-311
    [21]UCB. ALERT Systems Organization. ALERT-2 Protocol Development. http://www. altersystem.org,2009-03-28
    [22]Bonnet P, Gehrke J, Seshadri P. Querying the physical world. IEEE Personal Communication,2000,7(5):10-15
    [23]Noury N, Herve T, Rialle V, et al. Monitoring behavior in home using a smart fall sensor. In:Proc of the IEEE-EMBS Special Topic Conference on Microtechno-logies in Medicine and Biology. Lyon,2000,607-610.
    [24]Meyer S, Rakotonirainy A. A Survey of Research on Context-Aware Homes. In: Proc. of the Australasian information security workshop conference on ACSW frontiers. Adelaied,2003,159-168
    [25]Rentala P, Musunuri R, Gandham S, et al. Survey on sensor networks. In:Proc. of the ACM International Worshop on Wireless Sensor Networks and Applications.2004,239-312
    [26]Parker J. QuakeSim lessons for NASA Earth Science Sensor Webs. http://grids. ucs.indiana.edu/ptliupages/publications/QuakeSimSensorWebWhite.pdf
    [27]Shih E, Cho S, Ickes N, et al. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In:Proc. of the ACM MobiCom. Rome.2001,272-286
    [28]University of California at Los Angeles. WINS:Wireless Integrated network sensors, http://www.janet.ucla.edu/WINS.2005-03-14
    [29]Pister K. Smart Dust. http://robotics.eecs.berkeley.edu/-pister/SmartDust/
    [30]Crossbow Technology. MICA2:wireless measurement system. http://www. xbow. com/Products/Product_pdf_files/Wireless_pdf/6020-0042-04_A_MICA2.pdf, 2010-10-12
    [31]Polastre J, Levis P, Szewczyk R. TinyOS Hardware, http://www.tinyos.net/ scoop/special/hardware,2004-11-15
    [32]RICE. Project Sun SPOT:Sun small programmable object technology, http://www.sun-spotworld.com.2007-06-15
    [33]Intel. μAMPS:μ-Adaptive Multi-domain Power aware Sensors, http://www-mtl.mit.edu/researchgroups/icsystems/uamps,2009-10-01
    [34]Asada G. Dong M, Lin T S, et al. wireless integrated network sensors(WINS) for tactical information systems. In:Proc. of European Solid State Circuits Conference. New York,1998,15-20.
    [35]Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks. Communications of the ACM,2004.47(6):53-57
    [36]Newsome J. The Sybil attack in Sensor Networks:Analysis & Defense. In:Proc. of the third international symposium on information proceeding in sensor networks. New York,2004,259-268
    [37]Hartung C. Node Compromise in Sensor Networks:The Need for Secure Systems. Technical Report CU-CS-988-04, University of Colorado at Boulder, 2004
    [38]Wood A D, Stankovic J A. Denial of service in sensor networks. Computer,2002, 35(10):54-62
    [39]Karlof C, Wagner D. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures. In:Proc. of the 1st IEEE International Workshop on Sensor Network Protocols and Applications. Piscataway,2003,113-127
    [40]Xu W Y, Ma K, Trappe W, et al. Jamming sensor networks:attack and defense strategies. IEEE Network Special Issue on Sensor Networks,2006,20(3):41 47
    [41]Ilyas M, Mahgoub I. Handbook of sensor networks:Compact of wireless and wired sensing systems. CCR Press LLC,2005
    [42]Barr K C, Asanovic K. Energy Aware Lossless Data Compression, ACM Transactions on Computer Systems.2006.24(3):250-291.
    [43]Chan H, Perrig A. Security and Privacy in Sensor Networks. IEEE Computer Magazine,2003,36(10):103-105
    [44]俞波,杨珉.王治等.选择传递攻击中的异常丢包检测.计算机学报,2006,29(9):1540-1550.
    [45]Eschenauer L, Gligor V D. A Key-Management Scheme for Distributed Sensor Networks. In:Proc. of the 9th ACM Conference on Computer and Communications Security. Washington,2002,41-47.
    [46]Chan H, Perrig A, Song a. Random Key Predistribution Schemes for Sensor Networks. In:Proc. of IEEE Symposium on Security and Privacy. California. 2003.197-213.
    [47]Liu D. Ning P. Zhu S. Practical Broadcast Authentication in Sensor Networks. In: Proc. of the 2nd Annual International Conference on Mobile and Ubiquitous Systems(MobiQuitous05). California,2005,118-129.
    [48]周贤伟,覃伯平.基于能量优化的无线传感器网络安全路由算法.电子学报,2007.35(1):54-57.
    [49]王良民,马建峰,王超.无线传感器网络拓扑的容错度与容侵度.电子学报,2006,34(8):1446-1451.
    [50]Ye F, Luo H Y, Lu S W, et al. Statistical En-route Filtering of Injected False Data in Sensor Networks. Proc. of the 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004). Hongkong,2004, 2446-2457.
    [51]Ye F, Luo H Y, Lu S W. Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE Journal on Selected Areas in Communication,2005,23 (4).839-850.
    [52]Zhu S C, Setia S J, Jajodia S, et al. An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In:Proc. of IEEE Symposium on Security and Privacy. Berkeley,2004,259-271.
    [53]Yang H, Ye F, Yuan F, et al. Toward resilient security in wireless sensor networks. In:Proc. of the 6th ACM international symposium on Mobile ad hoc networking and computing. Illinois,2005,34-45.
    [54]Ma M. Resilience of Sink Filtering Scheme in Wireless Sensor Networks. Computer Communications,2006,30(1):55-65.
    [55]Zhou L, Ravishankar C V. A Fault Localized Scheme for False Report Filtering in Sensor Networks. In:Proc. of International Conference on Pervasive Services(ICPS'05). Santorini Greece,2005,59-68.
    [56]Li F, Wu J. A Probabilistic Voting-based Filtering Scheme. In:Proc. of the International Wireless Communications and Mobile Computing Conference(IWCMC'06). Columbia,2006,255-265.
    [57]Li F, Wu J. PVFS:A probabilistic voting-based filtering scheme in wireless sensor networks. International Journal of Security and Networks.2008,3(3): 173-182
    [58]Christoph K, Markus S, Kpatcha B, Claudia E. STEF:A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. In:Proc. of the 2nd International Conference on Availability, Reliability and Security. Vienna,2007, 310-317.
    [59]Hu Y P, Lin Y P, Yu J P, et al. A Robust Authentication Scheme for Filtering of Injected False Data in Dynamic Wireless Sensor Networks. Chinese Journal of Electronics (CJE),2007,24(3):443-448.
    [60]Yang H, Lu S W. Commutative Cipher Based En-route Filtering in Wireless Sensor Networks. In:Proc. of IEEE 60th Vehicular Technology Conference. Los Angeles,2004,1223-1227.
    [61]Zhang Y C. Liu W, Lou W J. et al. Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications,2006,24(2):247-260.
    [62]Kim Y H, Lee D H. An authentication scheme for filtering injected bogus data in sensor networks. Computer Communications.2008,31(17):3929-3932
    [63]Wang H D, Li Q. PDF:A Public-key based False Data Filtering Scheme in Sensor Networks. In:Proc. of IEEE the International Conference on Wireless Algorithms, Systems and Applications. Chicago,2007,129-138.
    [64]Erman A, Farshid D, Faramarz F. Location-Aware Security Services for Wireless Sensor Networks using Network Coding. In:Proc. of 26th Annual IEEE Conference on Computer Communications(INFOCOM). Anchorage,2007, 1226-1234.
    [65]Zhang W, Cao G. Group Rekeying for Filtering False Data in Sensor Networks:A Predistribution and Local Collaboration-Based Approach. Ad Hoc Networks, 2005,7(6):1229-1242.
    [66]曾玮妮,林亚平,胡玉鹏等.传感器网络中一种基于分布式更新权限的组密钥管理方案.计算机研究与发展.2007,44(4):606-614.
    [67]Yu Z, Guan Y. A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks. Proceedings of the 3rd international conference on Embedded networked sensor systems,SenSys "05:294-295.
    [68]Zhang Y, Yang J. Vu H. The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks. In:Proc. of 20th International Parallel and Distributed Processing Symposium(IPDPS'06). Island Greece.2006.1-10.
    [69]Cam H. Ozdemair s, Nair P, et al. Energy efficient and secure pattern based data aggregation for wireless sensor networks. In:Proc. of the Second IEEE Conference on Sensors. New York.2003.732-736.
    [70]Mahimkar A. Rappaport T S. SecureDAV:A Secure Data Aggregation and Verification Protocol for Sensor Networks. In:Proc. of Globecom2004. New York.2004.2175-2179.
    [71]Sanli H O. Ozdemir S, Cam h. Srda:Secure reference-based data aggregation protocol for wireless sensor networks. In:Proc. of IEEE VTC Fall 2004 Conference. New York,2004,4650-4654.
    [72]Przydatek B, Song D. Perrig A. SIA:Secure Information aggregation in sensor networks. In:Proc. of The First ACM Conference on Embedded Networked System. New York,2003,255-265.
    [73]Wagner D. Resilient Aggregation in Sensor Networks.In:Proc of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. Washington.2004,78-87.
    [74]Hu L, Evans D. Secure Aggregation for Wireless Networks. In:Proc. of Symposium on Applications and the Internet Workshops. Los Alamitos CA USA,2003,384-391.
    [75]Zhang W, Liu Y, K DAS S, et al. Secure data aggregation in wireless sensor networks:a watermark based authentication supportive approach. Pervasive and Mobile Computing,2008,4(6):658-680.
    [76]Sheng B, Li Q. Verifiable privacy-preserving range query in two-tiered sensor networks. In:Proc. of 27th IEEE International Conference on Computer Communications(INFOCOM2008). Phoenix AZ USA,2008,46-50.
    [77]Shi J, Zhang R, Zhang Y. Secure range queries in tiered sensor networks. In: Proc. of 28th IEEE International Conference on Computer Communications (INFOCOM2009). Brzil,2009,945-953
    [78]Zhang R, Shi J, Zhang Y. Secure multidimensional range queries in sensor networks. In:Proc. of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc2009). New Orleans,2009,197-206.
    [79]Chen F, Liu A X. SafeQ:Secure and efficient query processing in sensor networks. In:Proc. of IEEE International Conference on Computer Communications(INFOCOM 2010). San Diego,2010,1-9.
    [80]Hacigumus H, Iyer B, Li C, Mehrotra S. Executing sql over encrypted data in the database-service-provider model. In:Proc. of ACM International Conference on Management of Data (SIGMOD2002). Madison Wisconsin,2002,216-227.
    [81]Hore B, Mehrotra S, Tsudik G. A privacy-preserving index for range queries. In: Proc. of 30th International Conference on Very Large Data(VLDB2004). Toronto Canada,2004,720-731.
    [82]Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Proc. of Theory of Cryptography Conference(TCC2007). Amsterdam,2007, 535-554.
    [83]Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In:Proc. of IEEE Symposium on Security and Privacy. Berkeley,2000, 44-55.
    [84]Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In:Proc. of 2nd International Conference on Applied Cryptography and Network Security (ACNS2004). Maryland,2004,31-45.
    [85]Devanbu P, Gertz M, Martel C, Stubblebine S G. Authentic data publication over the internet. Journal of Computer Security,2003,3(11):291-314.
    [86]Pang H, Tan K L. Authenticating query results in edge computing. In:Proc. of 20th International Conference on Data Engineering. Boston,2004,560-571.
    [87]Pang H, Jain A, Ramamritham K, Tan K L. Verifying completeness of relational query results in data publishing. In:Proc. of ACM International Conference on on Management of Data (SIGMOD2005). Maryland,2005:407-418.
    [88]Narasimha M. Tsudik G. Authentication of outsourced databases using signature aggregation and chaining. In:Proc. of International Conference on Database Systems for Advanced Applications (DASFAA2006).Singapore,2006,420-436
    [89]Chen H, Man X, Hsu W, Li N, Wang Q. Access control friendly query verification for outsourced data publishing. In:Proc. of 13th European Symposium on Research in Computer Security (ESORICS2008). Malaga Spain, 2008,177-191.
    [90]Cheng W, Pang H, Tan K L. Authenticating multidimensional query results in data publishing. In:Proc. of the 20th IFIP Working Conference on Data and Application Security. Berlin,2006.60-73.
    [91]Merkle R. Protocols for public key cryptosystems. In:Proc. of IEEE Symposium on Security and Privacy. Oakland.1980,122-134.
    [92]张敏,洪澄,陈驰.一种服务器透明的外包数据库查询验证方法,计算机研究与发展,2010,47(1):182-190.
    [93]咸鹤群,冯登国.外包数据库模型中的完整检测方案,计算机研究与发展,2010.47(6):1107-1115.
    [94]Miller M L, Doerr G J, Cox I J. Applying Informed Coding and Embedding to Design a Robust, High capacity Watermark. IEEE Transactions on Image Processing.2004,13(6):792-807.
    [95]Peter H.W.Wong. Oscar C A. Yeung Y M, A Novel Blind Multiple Watermarking Technique for Images. IEEE Transactions on Circuits and Systems for Video Technology.2003,8(13):813-830.
    [96]Shehab M. Bertino E, Ghafoor A. Watermarking Relational Databases Using Optimization-Based Techniques. IEEE Transactions on Knowledge and Data Engineering.2008.20(1):116-129.
    [97]Yang E H, Sun W. On Information Embedding When Watermarks and Covertexts are Correlated. IEEE Transactions on Information Theory.2008.54(7):3340- 3345.
    [98]Wong J L, Feng J, Kirovski D, et al. Security in Sensor Networks:Watermarking Techniques. Wireless Sensor Networks.Germany:Springer Press,2004.305-323.
    [99]Feng J, Potkonjak M. Real-time Watermarking Techniques for Sensor Networks. In:Proc. of SPIE Security and Watermarking of Multimedia Contents. California,2003,391-402.
    [100]Kleider J E, Gifford S, Chupun S, et al. Radio frequency watermarking for OFDM wireless Networks, IEEE International Conference on Acoustics, Speech, and Signal Processing (INFOCOM2004). Piscataway,2004,397-400.
    [101]彭志娟,王汝传,王海艳.基于数字水印技术的无线传感器网络安全机制研究.南京邮电大学学报(自然科学版),2006,26(4):69-72.
    [102]易叶青,林亚平,李小龙等.WSN中基于协作水印的虚假数据过滤算法.软件学报.2010,21(1):107-118.
    [103]易叶青,林亚平,彭舸等.无线传感器网络中不依赖MAC认证的虚假数据过滤算法.通信学报.2009,20(6):53-63.
    [104]Zhou S W, Lin Y P, Wang J L, Zhang J M, Ouyang J C. Compressing Spatial and Temporal Correlated Data in Wireless Sensor Networks based on Ring Topology. In:Proc. of The Seventh International Conference on Web-Age Information Management (WAIM06). Hong Kong,2006,337-348.
    [105]Heinzelman W, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks. In:Proc. of the Hawaii International Conference on System Sciences. Germany,2003,181-191.
    [106]Yu G J, Lu C S, Liao H Y. Mean-quantization-based fragile watermarking for image authentication. Optical Engineering.2001,40(7):1396-1408.
    [107]Chen H, Li J, Mohapatra P. RACE:Time Series Compression with Rate Adaptivity and Error Bound for Sensor Networks. In:Proc. of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems(MASS'O4). New York,2004.124-133.
    [108]Logan J D. Applied Mathematics (A Contemporary Approach). New York:Wiley Press,1987.
    [109]Bolliger P, Kohler M, Romer K. Facet:towards a smart camera network of mobile phones. In:Proc. of 1st ACM International Conference on Autonomic Computing and Communication Systems (Autonomies'07). Rome Italy.2007, 76-86.
    [110]Misra S, Reisslein M. Xue G. A survey of multimedia streaming in wireless sensor networks. IEEE Communications Surveys and Tutorials,2008,10(9): 18-39.
    [111]Akyildiz F, Melodia T, Chowdhury KR. A survey on wireless multimedia sensor networks. Computer Networks,2007,51(4):921-960.
    [112]马华东,陶丹.多媒体传感器网络及其研究进展.软件学报,2006,17(9):2013-2028.
    [113]刘明,龚海刚,毛莺池等.高效节能的传感器网络数据收集和聚合协议.软件学报,2005,16(12):2106-2116.
    [114]Lam W M, Reibman A R. Error concealment algorithm for images subject to channel errors. IEEE Transactions on Image Processing,1995,5(4):533-542.
    [115]Sun H F, Joel W Z. Error concealment algorithms for robust decoding of MPEG compressed video. Signal Processing(Image Communication Issue 4),1997, 10(4):249-268.
    [116]Hemami S S, Meng T H. Transform coded image reconstruction exploiting interblock correlation. IEEE Transactions on Image Processing.1995,4(7): 1023-1027.
    [117]Wu H, Abouzeid A A. Error resilient image transport in wireless sensor networks. Computer Networks,2006,50(15):2873-2887.
    [118]Chen M, Leung V C M. Mao S, et al. Directional geographical routing for real-time video communications in wireless sensor networks. Computer Communications,2007,30(17):3368-3383.
    [119]Bourdon P, Augereau B, Olivier C, et al. A PDE-based method for ringing artifact removal on grayscale and color JPEG2000 images. In:Proc. of International Conference on Multimedia and Expo. Baltimore,2003.71-79.
    [120]Wong P W. Adaptive error diffusion and its application in muhiresolution rendering. IEEE Transactions on Image Processing,1996,5(7):1184-1196.
    [121]赵峙江,张田文.张志宏.一种基于视觉模型与连通域统计的阀值分割新算法,电子学报,2005,33(5):793-797.
    [122]Thomas H C. Charles E L. Ronald L R.et al(潘金贵,顾铁成,李成法等译).算法导论,机械工业出版社,2009,222-239.
    [123]Ma S W Gao W. Low Complexity Integer Transform and Adaptive Quantization Optimization,Journal of Computer Technology,2006,21(3):354-359.
    [124]Zuniga M, Krishnamachari B. Analyzing the transitional region in low power wireless links. In:Proc. of First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON2004). Santa Clara,2004,517-526.
    [125]Ratnasamy S, Karp B. Shenker S, et al. Data-centric storage in sensornets with ght, a geographic hash table. Mobile Networks and Applocations.2003,4(8): 427-442.
    [126]Desnoyers P, Ganesan D, Li H, et al. Presto:A predictive storage architecture for sensor networks. In:Proc. of 10th Workshop on Hot Topics in Operating Systems (HotOS2005). New Mexico,2005,50-56.
    [127]Zeinalipour-Yazti D, Lin S, Kalogeraki V, Gunopulos D, Najjar WA. Microhash: An efficient index structure for flash-based sensor devices. In Proc.4th USENIX Conference on File and Storage Technologies (FAST2005). Italian, 2005,31-44.
    [128]Sheng B, Li Q, Mao W. Data storage placement in sensor networks. In:Proc. of 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc2006). Florence Itly,2006,344-355.
    [129]Sheng B, TAN CC, Li Q, et al. An approximation algorithm for data storage placement in sensor networks. In:Proc. of International Conference on Wireless Algorithms, Systems and Applications (Wasa2007). Chicago Illinois,2007,71-78.
    [130]Intel. Stargate gateway (spb400). http://www.xbow.com,2010-10-13
    [131]RICE. Rise project.http://www.cs.ucr.edu/rise,2010-10-13
    [132]Intel. Intel lab data.http://berkeley.intel-research.net/labdata.2005-08-09
    [133]Zhang W S,Tran m, Zhu S C, et al. A random perturbation-based scheme for pairwise key establishment in sensor networks. In:Proc. of ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc2007). Canada,2007,90-99.
    [134]Wolf J K, Blakeney R D. An exact evaluation of the probability of undetected error for certain shortened binary crc codes. In:Proc. of IEEE MILCOM. San Diego,1988,287-292.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700