Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks
@inproceedings{Sun2013DigitalWM, title={Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks}, author={Xingming Sun and Jia-Jang Su and Baowei Wang and Qi Liu}, year={2013} }
Wireless sensor networks are self-organized and data-centric, which have been well applied in many practical areas. [] Key Method At the base station side, a watermarking algorithm is designed to extract the watermarking information, which is compared to recalculated watermarking information to verify the integrity of the data during the transmission. Compare to other watermarking methods, our algorithm does not increase extra data storage space and remain data accuracy. According to the results of extensive…
33 Citations
A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks
- Computer Science2016 19th International Conference on Network-Based Information Systems (NBiS)
- 2016
This work proposes a method to verify the integrity of the sensor data, which is based on a zero watermarking scheme, and shows that the scheme is robust against different types of data integrity attacks such as data insertion, data modification, and data deletion.
A Copyright Protection Method for Wireless Sensor Networks Based on Digital Watermarking
- Computer Science
- 2015
A digital watermarking based copyright protection method is proposed with regard to data security in wireless sensor networks and according to the particular characteristics of collecting data, the embedding capacity can be expanded using this method of manipulating both LSB and MSRB bits of the data field.
Data protection based on multifunction digital watermark in wireless sensor network
- Computer Science2015 International Carnahan Conference on Security Technology (ICCST)
- 2015
The scheme integrates image content authentication, integrity audit service and copyright protection through a multiple function self-embedded watermarking scheme, which is the advantage of the scheme.
Adaptable Embedding Algorithm to Secure Stream Data in the Wireless Sensor Network
- Computer ScienceIntelliSys
- 2020
A novel data integrity protection method based on an adaptable and distributed approach of watermark embedding has been proposed in this paper that identifies the distinct length of data of the same primitive data type.
Digital Watermark-Based Independent Individual Certification Scheme in WSNs
- Computer ScienceIEEE Access
- 2019
The experimental results demonstrate the proposed watermarking scheme based on individual certification for sensor nodes has superior performance compared with other certification schemes in WSNs.
An Independent Individual Certification Scheme Based on Digital Watermark in WSNs
- Computer Science2019 IEEE International Conference on Smart Internet of Things (SmartIoT)
- 2019
Experimental results demonstrate the proposed watermarking scheme based on individual certification for sensor nodes has more superior performance compared with other certification schemes in WSNs.
The reliability of data protection algorithm based on check code in wireless sensor networks
- Computer Science2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
- 2015
RDPA using check code and watermarking, can accurately calculate the degree of influence, improves energy efficiency and has high sensitivity to kinds of attacks.
A Packet Loss Tolerated Method for Data Integrity Protection in Wireless Sensor Networks
- Computer ScienceMUE 2016
- 2016
A packet loss tolerated method for data integrity protection in wireless sensor networks based on double-level watermarking and threshold control that can effectively protect data integrity with low power is proposed.
A novel digital watermarking scheme for data authentication and copyright protection in 5G networks
- Computer ScienceComput. Electr. Eng.
- 2018
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
- Computer ScienceFuture Gener. Comput. Syst.
- 2018
References
SHOWING 1-10 OF 14 REFERENCES
Watermarking sensor data for protecting the integrity
- Computer Science2008 International Conference on Innovations in Information Technology
- 2008
Performance evaluations show that watermark composition as well as the embedding and the extraction algorithms of the S-SGW and FWC are much faster than that of Guo et.al.
Real-time watermarking techniques for sensor networks
- Computer ScienceIS&T/SPIE Electronic Imaging
- 2003
The first system of watermarking techniques to embed cryptologically encoded authorship signatures into data and information acquired by wireless embedded sensor networks is developed, to impose additional constraints during the data acquisition or sensor data processing.
Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach
- Computer SciencePervasive Mob. Comput.
- 2008
A Lightweight Data Integrity Scheme for Sensor Networks
- Computer ScienceSensors
- 2011
A new fragile watermarking technique to detect unauthorized alterations in WSN data streams, which uses group delimiters to keep the sender and receivers synchronized and help them to avoid ambiguity in the event of data insertion or deletion and is much faster than SGW.
Chaining watermarks for detecting malicious modifications to streaming data
- Computer ScienceInf. Sci.
- 2007
Secure Data Transmission of Wireless Sensor Network Based on Information Hiding
- Computer Science2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous)
- 2007
This work proposes a novel secure transmission strategy based on information hiding (IH) that is suitable for stream data in sensor nodes and demonstrates that it is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility.
Wireless integrated network sensors
- Computer ScienceCommun. ACM
- 2000
The WINS network represents a new monitoring and control capability for applications in such industries as transportation, manufacturing, health care, environmental oversight, and safety and security, and opportunities depend on development of a scalable, low-cost, sensor-network architecture.
An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks
- Computer Science2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
- 2009
Analysis for the security and energy consumption of the algorithms and experimental results show that these algorithms are effective and practicable and robust enough to resist the process of aggregations such as sampling and summarization.
Aggregation Supportive Authentication in Wireless Sensor Networks: A Watermark Based Approach
- Computer Science2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
- 2007
This paper proposes an end-to-end approach for data authentication in WSNs that provides inherent support for in-network processing and shows that the proposed scheme can successfully authenticate the sensory data with high confidence.