Corpus ID: 26227314

Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks

@inproceedings{Sun2013DigitalWM,
  title={Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks},
  author={Xingming Sun and Jia-Jang Su and Baowei Wang and Qi Liu},
  year={2013}
}
Wireless sensor networks are self-organized and data-centric, which have been well applied in many practical areas. [...] Key Method At the base station side, a watermarking algorithm is designed to extract the watermarking information, which is compared to recalculated watermarking information to verify the integrity of the data during the transmission. Compare to other watermarking methods, our algorithm does not increase extra data storage space and remain data accuracy. According to the results of extensive…Expand
A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks
TLDR
This work proposes a method to verify the integrity of the sensor data, which is based on a zero watermarking scheme, and shows that the scheme is robust against different types of data integrity attacks such as data insertion, data modification, and data deletion. Expand
A Copyright Protection Method for Wireless Sensor Networks Based on Digital Watermarking
TLDR
A digital watermarking based copyright protection method is proposed with regard to data security in wireless sensor networks and according to the particular characteristics of collecting data, the embedding capacity can be expanded using this method of manipulating both LSB and MSRB bits of the data field. Expand
Data protection based on multifunction digital watermark in wireless sensor network
TLDR
The scheme integrates image content authentication, integrity audit service and copyright protection through a multiple function self-embedded watermarking scheme, which is the advantage of the scheme. Expand
Watermarking schemes for secure data aggregation in wireless sensor networks: A review paper
  • Vandana Dhiman, P. Khandnor
  • Engineering
  • 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
  • 2016
Wireless sensor networks consists of sensors nodes used for the communication purpose. Wireless sensor networks are self-organized and data-centric. In Wireless sensor networks, there are some issuesExpand
Adaptable Embedding Algorithm to Secure Stream Data in the Wireless Sensor Network
TLDR
A novel data integrity protection method based on an adaptable and distributed approach of watermark embedding has been proposed in this paper that identifies the distinct length of data of the same primitive data type. Expand
Digital Watermark-Based Independent Individual Certification Scheme in WSNs
TLDR
The experimental results demonstrate the proposed watermarking scheme based on individual certification for sensor nodes has superior performance compared with other certification schemes in WSNs. Expand
An Independent Individual Certification Scheme Based on Digital Watermark in WSNs
  • Yan Xiao, Guangyong Gao
  • Computer Science
  • 2019 IEEE International Conference on Smart Internet of Things (SmartIoT)
  • 2019
TLDR
Experimental results demonstrate the proposed watermarking scheme based on individual certification for sensor nodes has more superior performance compared with other certification schemes in WSNs. Expand
Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach
TLDR
This paper proposes a new fully distributed watermarking approach for WSNs focused on ensuring authenticity and authenticity of data and the proposed approach is implemented and simulated with the CupCarbon simulator. Expand
The reliability of data protection algorithm based on check code in wireless sensor networks
TLDR
RDPA using check code and watermarking, can accurately calculate the degree of influence, improves energy efficiency and has high sensitivity to kinds of attacks. Expand
A Packet Loss Tolerated Method for Data Integrity Protection in Wireless Sensor Networks
TLDR
A packet loss tolerated method for data integrity protection in wireless sensor networks based on double-level watermarking and threshold control that can effectively protect data integrity with low power is proposed. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 14 REFERENCES
An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks
  • Xiaomei Dong, Xiaohua Li
  • Computer Science
  • 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
  • 2009
TLDR
Analysis for the security and energy consumption of the algorithms and experimental results show that these algorithms are effective and practicable and robust enough to resist the process of aggregations such as sampling and summarization. Expand
Watermarking sensor data for protecting the integrity
  • H. Juma, I. Kamel, L. Kaya
  • Computer Science
  • 2008 International Conference on Innovations in Information Technology
  • 2008
TLDR
Performance evaluations show that watermark composition as well as the embedding and the extraction algorithms of the S-SGW and FWC are much faster than that of Guo et.al. Expand
Real-time watermarking techniques for sensor networks
TLDR
The first system of watermarking techniques to embed cryptologically encoded authorship signatures into data and information acquired by wireless embedded sensor networks is developed, to impose additional constraints during the data acquisition or sensor data processing. Expand
Aggregation Supportive Authentication in Wireless Sensor Networks: A Watermark Based Approach
TLDR
This paper proposes an end-to-end approach for data authentication in WSNs that provides inherent support for in-network processing and shows that the proposed scheme can successfully authenticate the sensory data with high confidence. Expand
Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach
TLDR
This paper proposes an end-to-end, statistical approach for data authentication that provides inherent support for in-network processing and shows that the proposed scheme can successfully authenticate the sensory data with high confidence. Expand
A Lightweight Data Integrity Scheme for Sensor Networks
TLDR
A new fragile watermarking technique to detect unauthorized alterations in WSN data streams, which uses group delimiters to keep the sender and receivers synchronized and help them to avoid ambiguity in the event of data insertion or deletion and is much faster than SGW. Expand
Chaining watermarks for detecting malicious modifications to streaming data
TLDR
A novel fragile watermarking algorithm which verifies the integrity of streaming data at the application layer and efficiently detect and locate modifications and ensure the completeness of data streams is proposed. Expand
Secure Data Transmission of Wireless Sensor Network Based on Information Hiding
TLDR
This work proposes a novel secure transmission strategy based on information hiding (IH) that is suitable for stream data in sensor nodes and demonstrates that it is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility. Expand
Resilient Rights Protection for Sensor Streams
TLDR
This paper introduces the issue of rights protection for discrete streaming data through watermarking and proposes a solution and analyzes its resilience to various types of attacks as well as some of the important expected domain-specific transforms, such as sampling and summarization. Expand
Wireless integrated network sensors
TLDR
The WINS network represents a new monitoring and control capability for applications in such industries as transportation, manufacturing, health care, environmental oversight, and safety and security, and opportunities depend on development of a scalable, low-cost, sensor-network architecture. Expand
...
1
2
...