Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines
DOI: 10.23977/acss.2019.31002 | Downloads: 2 | Views: 310
Wang Baoyi 1, Hou Zepeng 1, Zhang Shaomin 1
1 School of Control and Computer Engineering, North China Electric Power University, Baoding, 071003, China
Corresponding AuthorWang Baoyi
The wireless sensor network is arranged on the long-chain distributed electric transmission line for real-time monitoring of the electric transmission line. The safe transmission of the collected electric transmission line sensing data is a key issue to be solved urgently. Due to the low processing ability of the sensor nodes, conventional high-complexity security methods such as traditional identity authentication and tamper-proofing can extend the processing time of the node processor, which is unacceptable for real-time data. In addition, due to the high voltage of the electric transmission line, it is impossible to supply power to the wireless sensor nodes directly, and the traditional complicated safety methods have high energy consumption. Therefore, this paper proposes a WSN secure communication solution for electric transmission line based on digital watermark. The algorithm has less time overhead and meets the real-time requirements of WSN communication in electric transmission lines.
KEYWORDSElectric transmission line, WSN, digital watermark, secure communication
CITE THIS PAPER
Baoyi, W., Zepeng, H., Shaomin, Z., Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines, Advances in Computer, Signals and Systems (2019) 3: 8-14. DOI: http://dx.doi.org/10.23977/acss.2019.31002.
 Tan Long, Yan Chao. Research on Wireless Sensor Network Security Algorithm [J]. Computer Science, 2015, 42(S1): 438-443.
 Li Lifen. Research on Transmission Line Condition Monitoring Data Transmission Based on Wireless Sensor Network [D]. North China Electric Power University, 2013.
 Li Tian,Shi Xin,Li Yongqian. Study on Routing Optimization Technology of Wireless Sensor Networks Based on Transmission Line Monitoring [J].Electrical Measurement & Instrumentation, 2015, 52(21):6-10.
 Wang Baoyi, Wang Min an, Zhang Shaomin. A GCM-Based Secure Transmission Method for Intelligent Substation Messages [J]. Automation of Electric Power Systems, 2013, 37(03):87-92.
 Chhaya L, Sharma P, Bhagwatikar G. Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control [J]. 2016, 6(1):5-12.
 Jiang Xin, Hu Ping, Wang Wei, Xu Hui. Research on Encryption Algorithm for WSN Environment Data Transmission [J]. Automated Instrument, 2016, 37(11):55-57+65.
 Shi Xin, Zhu Yongli. Research on QoS Guarantee Technology for Wireless Transmission Networks for Transmission Line Monitoring [J]. China Electric Power, 2015, 48(03):39-43
 Wu Haiyan, Chen Yang. Wireless Sensor Network Authentication Algorithm Based on CRC and Reversible Digital Watermarking [J]. Computer Applications and Software, 2016, 33(06): 294-297+324.
 Sen A, Chatterjee T, Dasbit S. LoWaNA: Low Overhead Watermark Based Node Authentication in WSN[J]. Wireless Networks, 2016, 22(7):8-15.