Education, Science, Technology, Innovation and Life
Open Access
Sign In

Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines

Download as PDF

DOI: 10.23977/acss.2019.31002 | Downloads: 14 | Views: 875


Wang Baoyi 1, Hou Zepeng 1, Zhang Shaomin 1


1 School of Control and Computer Engineering, North China Electric Power University, Baoding, 071003, China

Corresponding Author

Wang Baoyi


The wireless sensor network is arranged on the long-chain distributed electric transmission line for real-time monitoring of the electric transmission line. The safe transmission of the collected electric transmission line sensing data is a key issue to be solved urgently. Due to the low processing ability of the sensor nodes, conventional high-complexity security methods such as traditional identity authentication and tamper-proofing can extend the processing time of the node processor, which is unacceptable for real-time data. In addition, due to the high voltage of the electric transmission line, it is impossible to supply power to the wireless sensor nodes directly, and the traditional complicated safety methods have high energy consumption. Therefore, this paper proposes a WSN secure communication solution for electric transmission line based on digital watermark. The algorithm has less time overhead and meets the real-time requirements of WSN communication in electric transmission lines.


Electric transmission line, WSN, digital watermark, secure communication


Baoyi, W., Zepeng, H., Shaomin, Z., Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines, Advances in Computer, Signals and Systems (2019) 3: 8-14. DOI:


[1] Tan Long, Yan Chao. Research on Wireless Sensor Network Security Algorithm [J]. Computer Science, 2015, 42(S1): 438-443.
[2] Li Lifen. Research on Transmission Line Condition Monitoring Data Transmission Based on Wireless Sensor Network [D]. North China Electric Power University, 2013.
[3] Li Tian,Shi Xin,Li Yongqian. Study on Routing Optimization Technology of Wireless Sensor Networks Based on Transmission Line Monitoring [J].Electrical Measurement & Instrumentation, 2015, 52(21):6-10.
[4] Wang Baoyi, Wang Min an, Zhang Shaomin. A GCM-Based Secure Transmission Method for Intelligent Substation Messages [J]. Automation of Electric Power Systems, 2013, 37(03):87-92.
[5] Chhaya L, Sharma P, Bhagwatikar G. Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control [J]. 2016, 6(1):5-12.
[6] Jiang Xin, Hu Ping, Wang Wei, Xu Hui. Research on Encryption Algorithm for WSN Environment Data Transmission [J]. Automated Instrument, 2016, 37(11):55-57+65.
[7] Shi Xin, Zhu Yongli. Research on QoS Guarantee Technology for Wireless Transmission Networks for Transmission Line Monitoring [J]. China Electric Power, 2015, 48(03):39-43
[8] Wu Haiyan, Chen Yang. Wireless Sensor Network Authentication Algorithm Based on CRC and Reversible Digital Watermarking [J]. Computer Applications and Software, 2016, 33(06): 294-297+324. 
[9] Sen A, Chatterjee T, Dasbit S. LoWaNA: Low Overhead Watermark Based Node Authentication in WSN[J]. Wireless Networks, 2016, 22(7):8-15.

Downloads: 618
Visits: 30901

Sponsors, Associates, and Links

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.