• Corpus ID: 26227314

Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks

@inproceedings{Sun2013DigitalWM,
  title={Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks},
  author={Xingming Sun and Jia-Jang Su and Baowei Wang and Qi Liu},
  year={2013}
}
Wireless sensor networks are self-organized and data-centric, which have been well applied in many practical areas. [] Key Method At the base station side, a watermarking algorithm is designed to extract the watermarking information, which is compared to recalculated watermarking information to verify the integrity of the data during the transmission. Compare to other watermarking methods, our algorithm does not increase extra data storage space and remain data accuracy. According to the results of extensive…

Figures and Tables from this paper

A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks

This work proposes a method to verify the integrity of the sensor data, which is based on a zero watermarking scheme, and shows that the scheme is robust against different types of data integrity attacks such as data insertion, data modification, and data deletion.

A Copyright Protection Method for Wireless Sensor Networks Based on Digital Watermarking

A digital watermarking based copyright protection method is proposed with regard to data security in wireless sensor networks and according to the particular characteristics of collecting data, the embedding capacity can be expanded using this method of manipulating both LSB and MSRB bits of the data field.

Data protection based on multifunction digital watermark in wireless sensor network

The scheme integrates image content authentication, integrity audit service and copyright protection through a multiple function self-embedded watermarking scheme, which is the advantage of the scheme.

Watermarking schemes for secure data aggregation in wireless sensor networks: A review paper

  • Vandana DhimanP. Khandnor
  • Computer Science
    2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
  • 2016
Comparison of various schemes based on watermarking technologies to protect the data integrity of wireless sensor networks based on characteristics like the method adopted by each scheme and the position at which integrity is provided is provided.

Adaptable Embedding Algorithm to Secure Stream Data in the Wireless Sensor Network

A novel data integrity protection method based on an adaptable and distributed approach of watermark embedding has been proposed in this paper that identifies the distinct length of data of the same primitive data type.

Digital Watermark-Based Independent Individual Certification Scheme in WSNs

The experimental results demonstrate the proposed watermarking scheme based on individual certification for sensor nodes has superior performance compared with other certification schemes in WSNs.

An Independent Individual Certification Scheme Based on Digital Watermark in WSNs

  • Yan XiaoGuangyong Gao
  • Computer Science
    2019 IEEE International Conference on Smart Internet of Things (SmartIoT)
  • 2019
Experimental results demonstrate the proposed watermarking scheme based on individual certification for sensor nodes has more superior performance compared with other certification schemes in WSNs.

Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach

This paper proposes a new fully distributed watermarking approach for WSNs focused on ensuring authenticity and authenticity of data and the proposed approach is implemented and simulated with the CupCarbon simulator.

The reliability of data protection algorithm based on check code in wireless sensor networks

RDPA using check code and watermarking, can accurately calculate the degree of influence, improves energy efficiency and has high sensitivity to kinds of attacks.

A Packet Loss Tolerated Method for Data Integrity Protection in Wireless Sensor Networks

A packet loss tolerated method for data integrity protection in wireless sensor networks based on double-level watermarking and threshold control that can effectively protect data integrity with low power is proposed.

References

SHOWING 1-10 OF 14 REFERENCES

An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks

  • Xiaomei DongXiaohua Li
  • Computer Science
    2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
  • 2009
Analysis for the security and energy consumption of the algorithms and experimental results show that these algorithms are effective and practicable and robust enough to resist the process of aggregations such as sampling and summarization.

Real-time watermarking techniques for sensor networks

The first system of watermarking techniques to embed cryptologically encoded authorship signatures into data and information acquired by wireless embedded sensor networks is developed, to impose additional constraints during the data acquisition or sensor data processing.

Aggregation Supportive Authentication in Wireless Sensor Networks: A Watermark Based Approach

This paper proposes an end-to-end approach for data authentication in WSNs that provides inherent support for in-network processing and shows that the proposed scheme can successfully authenticate the sensory data with high confidence.

A Lightweight Data Integrity Scheme for Sensor Networks

A new fragile watermarking technique to detect unauthorized alterations in WSN data streams, which uses group delimiters to keep the sender and receivers synchronized and help them to avoid ambiguity in the event of data insertion or deletion and is much faster than SGW.

Chaining watermarks for detecting malicious modifications to streaming data

Secure Data Transmission of Wireless Sensor Network Based on Information Hiding

This work proposes a novel secure transmission strategy based on information hiding (IH) that is suitable for stream data in sensor nodes and demonstrates that it is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility.

Resilient Rights Protection for Sensor Streams

Wireless integrated network sensors

The WINS network represents a new monitoring and control capability for applications in such industries as transportation, manufacturing, health care, environmental oversight, and safety and security, and opportunities depend on development of a scalable, low-cost, sensor-network architecture.

Watermarking sensor data for protecting the integrity

  • H. JumaI. KamelL. Kaya
  • Computer Science
    2008 International Conference on Innovations in Information Technology
  • 2008
Performance evaluations show that watermark composition as well as the embedding and the extraction algorithms of the S-SGW and FWC are much faster than that of Guo et.al.