Abstract

With the development of wireless sensor networks (WSNs), data security has gained considerable attention. Since the sensor node is in a special environment with small volume and limited storage space, it is highly likely to be attacked illegally when transmitting the data. This paper proposes a watermarking scheme based on individual certification for sensor nodes. The data is grouped in a sensor node. A watermarking bit is generated by associating several other data items within a group, and is embedded in the group as a space. At the sink node, the extracted watermarking bit is compared with the watermarking bit generated by the same way in the sensor node to determine whether the data item has been tampered. The watermarking bit embedded in the proposed scheme is extremely difficult to be found in the transmission process. Meanwhile, it does not change the original data. The experimental results demonstrate the proposed scheme has superior performance compared with other certification schemes in WSNs.

Highlights

  • Wireless sensor network (WSN) is usually composed of sensor, sink and management nodes

  • WATERMARK EXTRACTION AND COMPARISON After the data is received from the sensor nodes, it is grouped in the same way as the watermarking embedding process

  • A data item that has not been tampered with is misjudged as a tampered data item, because the watermarking bits of the data item are affected by the tampered data

Read more

Summary

INTRODUCTION

Wireless sensor network (WSN) is usually composed of sensor, sink and management nodes. Zhou and Zhang [6] embedded the data and the watermark information together into the hash sequence, which avoided destroying the data transmitted by sensor nodes. Li et al [9] proposed a new idea and considered the sensor nodes distributed in each environment as the distributed pixels in the image to generate distributed watermarks. This was a reversible solution in which the original data was calculated according to the difference vector. Hameed et al [11] proposed to utilize the characteristics of the data itself to generate and encrypt the watermark, and transmit the watermarking bit with the data to the authentication node.

INDIVIDUAL DATA VERIFICATION SCHEME
WATERMARK GENERATION AND EMBEDDING
FALSE POSITIVE RATE
DETERMINATION OF M VALUE
EXPERIMENTAL RESULTS AND ANALYSIS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.