Industrial IoT Technologies and Applications. Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25–26, 2017, Proceedings

Research Article

Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC

Download
179 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-60753-5_14,
        author={Guangyong Gao and Caixue Zhou and Zongmin Cui and Shimao Yao and Zhijun Chong},
        title={Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC},
        proceedings={Industrial IoT Technologies and Applications. Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25--26, 2017, Proceedings},
        proceedings_a={INDUSTRIALIOT},
        year={2017},
        month={9},
        keywords={Wireless sensor network (WSN) Reversible authentication Prediction-error histogram (PEH)},
        doi={10.1007/978-3-319-60753-5_14}
    }
    
  • Guangyong Gao
    Caixue Zhou
    Zongmin Cui
    Shimao Yao
    Zhijun Chong
    Year: 2017
    Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC
    INDUSTRIALIOT
    Springer
    DOI: 10.1007/978-3-319-60753-5_14
Guangyong Gao1,*, Caixue Zhou1, Zongmin Cui1, Shimao Yao1, Zhijun Chong1
  • 1: Jiujiang University
*Contact email: gaoguangyong@163.com

Abstract

In this paper, a reversible authentication scheme for wireless sensor network (WSN) is proposed. Firstly, the WSN data stream is divided into some authentication groups, and each authentication group is composed of a generator group and a carrier group. Then the cyclical redundancy check (CRC) code of generator group is produced as the authentication information. In the carrier group, using the prediction-error-based histogram shifting algorithm, the authentication information is reversibly embedded into the fluctuation region of prediction-error histogram (PEH), not the smooth region. Experimental results and analysis demonstrate that compared with previous schemes, the proposed scheme achieves better performances on computation complex, false tampering alarm and attraction to attackers.