• Corpus ID: 26227314

Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks

  title={Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks},
  author={Xingming Sun and Jia-Jang Su and Baowei Wang and Qi Liu},
Wireless sensor networks are self-organized and data-centric, which have been well applied in many practical areas. [] Key Method At the base station side, a watermarking algorithm is designed to extract the watermarking information, which is compared to recalculated watermarking information to verify the integrity of the data during the transmission. Compare to other watermarking methods, our algorithm does not increase extra data storage space and remain data accuracy. According to the results of extensive…

Figures and Tables from this paper

A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks
This work proposes a method to verify the integrity of the sensor data, which is based on a zero watermarking scheme, and shows that the scheme is robust against different types of data integrity attacks such as data insertion, data modification, and data deletion.
A Copyright Protection Method for Wireless Sensor Networks Based on Digital Watermarking
A digital watermarking based copyright protection method is proposed with regard to data security in wireless sensor networks and according to the particular characteristics of collecting data, the embedding capacity can be expanded using this method of manipulating both LSB and MSRB bits of the data field.
Data protection based on multifunction digital watermark in wireless sensor network
The scheme integrates image content authentication, integrity audit service and copyright protection through a multiple function self-embedded watermarking scheme, which is the advantage of the scheme.
Adaptable Embedding Algorithm to Secure Stream Data in the Wireless Sensor Network
A novel data integrity protection method based on an adaptable and distributed approach of watermark embedding has been proposed in this paper that identifies the distinct length of data of the same primitive data type.
Digital Watermark-Based Independent Individual Certification Scheme in WSNs
The experimental results demonstrate the proposed watermarking scheme based on individual certification for sensor nodes has superior performance compared with other certification schemes in WSNs.
An Independent Individual Certification Scheme Based on Digital Watermark in WSNs
  • Yan XiaoGuangyong Gao
  • Computer Science
    2019 IEEE International Conference on Smart Internet of Things (SmartIoT)
  • 2019
Experimental results demonstrate the proposed watermarking scheme based on individual certification for sensor nodes has more superior performance compared with other certification schemes in WSNs.
The reliability of data protection algorithm based on check code in wireless sensor networks
RDPA using check code and watermarking, can accurately calculate the degree of influence, improves energy efficiency and has high sensitivity to kinds of attacks.
A Packet Loss Tolerated Method for Data Integrity Protection in Wireless Sensor Networks
A packet loss tolerated method for data integrity protection in wireless sensor networks based on double-level watermarking and threshold control that can effectively protect data integrity with low power is proposed.


Watermarking sensor data for protecting the integrity
  • H. JumaI. KamelL. Kaya
  • Computer Science
    2008 International Conference on Innovations in Information Technology
  • 2008
Performance evaluations show that watermark composition as well as the embedding and the extraction algorithms of the S-SGW and FWC are much faster than that of Guo et.al.
Real-time watermarking techniques for sensor networks
The first system of watermarking techniques to embed cryptologically encoded authorship signatures into data and information acquired by wireless embedded sensor networks is developed, to impose additional constraints during the data acquisition or sensor data processing.
A Lightweight Data Integrity Scheme for Sensor Networks
A new fragile watermarking technique to detect unauthorized alterations in WSN data streams, which uses group delimiters to keep the sender and receivers synchronized and help them to avoid ambiguity in the event of data insertion or deletion and is much faster than SGW.
Chaining watermarks for detecting malicious modifications to streaming data
Secure Data Transmission of Wireless Sensor Network Based on Information Hiding
This work proposes a novel secure transmission strategy based on information hiding (IH) that is suitable for stream data in sensor nodes and demonstrates that it is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility.
Resilient Rights Protection for Sensor Streams
Wireless integrated network sensors
The WINS network represents a new monitoring and control capability for applications in such industries as transportation, manufacturing, health care, environmental oversight, and safety and security, and opportunities depend on development of a scalable, low-cost, sensor-network architecture.
An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks
  • Xiaomei DongXiaohua Li
  • Computer Science
    2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
  • 2009
Analysis for the security and energy consumption of the algorithms and experimental results show that these algorithms are effective and practicable and robust enough to resist the process of aggregations such as sampling and summarization.
Aggregation Supportive Authentication in Wireless Sensor Networks: A Watermark Based Approach
This paper proposes an end-to-end approach for data authentication in WSNs that provides inherent support for in-network processing and shows that the proposed scheme can successfully authenticate the sensory data with high confidence.