Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines
DOI: 10.23977/acss.2019.31002 | Downloads: 21 | Views: 2857
Author(s)
Wang Baoyi 1, Hou Zepeng 1, Zhang Shaomin 1
Affiliation(s)
1 School of Control and Computer Engineering, North China Electric Power University, Baoding, 071003, China
Corresponding Author
Wang BaoyiABSTRACT
The wireless sensor network is arranged on the long-chain distributed electric transmission line for real-time monitoring of the electric transmission line. The safe transmission of the collected electric transmission line sensing data is a key issue to be solved urgently. Due to the low processing ability of the sensor nodes, conventional high-complexity security methods such as traditional identity authentication and tamper-proofing can extend the processing time of the node processor, which is unacceptable for real-time data. In addition, due to the high voltage of the electric transmission line, it is impossible to supply power to the wireless sensor nodes directly, and the traditional complicated safety methods have high energy consumption. Therefore, this paper proposes a WSN secure communication solution for electric transmission line based on digital watermark. The algorithm has less time overhead and meets the real-time requirements of WSN communication in electric transmission lines.
KEYWORDS
Electric transmission line, WSN, digital watermark, secure communicationCITE THIS PAPER
Baoyi, W., Zepeng, H., Shaomin, Z., Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines, Advances in Computer, Signals and Systems (2019) 3: 8-14. DOI: http://dx.doi.org/10.23977/acss.2019.31002.
REFERENCES
[1] Tan Long, Yan Chao. Research on Wireless Sensor Network Security Algorithm [J]. Computer Science, 2015, 42(S1): 438-443.
[2] Li Lifen. Research on Transmission Line Condition Monitoring Data Transmission Based on Wireless Sensor Network [D]. North China Electric Power University, 2013.
[3] Li Tian,Shi Xin,Li Yongqian. Study on Routing Optimization Technology of Wireless Sensor Networks Based on Transmission Line Monitoring [J].Electrical Measurement & Instrumentation, 2015, 52(21):6-10.
[4] Wang Baoyi, Wang Min an, Zhang Shaomin. A GCM-Based Secure Transmission Method for Intelligent Substation Messages [J]. Automation of Electric Power Systems, 2013, 37(03):87-92.
[5] Chhaya L, Sharma P, Bhagwatikar G. Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control [J]. 2016, 6(1):5-12.
[6] Jiang Xin, Hu Ping, Wang Wei, Xu Hui. Research on Encryption Algorithm for WSN Environment Data Transmission [J]. Automated Instrument, 2016, 37(11):55-57+65.
[7] Shi Xin, Zhu Yongli. Research on QoS Guarantee Technology for Wireless Transmission Networks for Transmission Line Monitoring [J]. China Electric Power, 2015, 48(03):39-43
[8] Wu Haiyan, Chen Yang. Wireless Sensor Network Authentication Algorithm Based on CRC and Reversible Digital Watermarking [J]. Computer Applications and Software, 2016, 33(06): 294-297+324.
[9] Sen A, Chatterjee T, Dasbit S. LoWaNA: Low Overhead Watermark Based Node Authentication in WSN[J]. Wireless Networks, 2016, 22(7):8-15.
Downloads: | 11335 |
---|---|
Visits: | 240360 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks