A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

Since its introduction, IoT (Internet of Things) has enjoyed vigorous support from governments and research institutions around the world, and remarkable achievements have been obtained. The perception layer of IoT plays an important role as a link between the IoT and the real world; the security has become a bottleneck restricting the further development of IoT. The perception layer is a self-organizing network system consisting of various resource-constrained sensor nodes through wireless communication. Accordingly, the costly encryption mechanism cannot be applied to the perception layer. In this paper, a novel lightweight data integrity protection scheme based on fragile watermark is proposed to solve the contradiction between the security and restricted resource of perception layer. To improve the security, we design a position random watermark (PRW) strategy to calculate the embedding position by temporal dynamics of sensing data. The digital watermark is generated by one-way hash function SHA-1 before embedding to the dynamic computed position. In this way, the security vulnerabilities introduced by fixed embedding position can not only be solved effectively, but also achieve zero disturbance to the data. The security analysis and simulation results show that the proposed scheme can effectively ensure the integrity of the data at low cost.

[1]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[2]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[3]  Ibrahim Kamel,et al.  Simplified watermarking scheme for sensor networks , 2010, Int. J. Internet Protoc. Technol..

[4]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[5]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[6]  Sushil Jajodia,et al.  Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..

[7]  Donggang Liu,et al.  Security mechanisms for wireless sensor networks , 2005 .

[8]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[9]  Xiaohua Li,et al.  An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[10]  Fernando Pérez-González,et al.  Watermarking Security: A Survey , 2006, Trans. Data Hiding Multim. Secur..

[11]  Azeddine Bilami,et al.  SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs , 2016, Telecommun. Syst..

[12]  Wenjia Li,et al.  Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities , 2018, IEEE Internet of Things Journal.

[13]  Ibrahim Kamel,et al.  A Lightweight Data Integrity Scheme for Sensor Networks , 2011, Sensors.

[14]  S. Anbuchelian,et al.  Improving security in Wireless Sensor Network using trust and metaheuristic algorithms , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).

[15]  Ibrahim Kamel,et al.  Distortion-Free Watermarking Scheme for Wireless Sensor Networks , 2009, 2009 International Conference on Intelligent Networking and Collaborative Systems.

[16]  Xingming Sun,et al.  Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks , 2013 .

[17]  Di Xiao,et al.  A reversible watermarking authentication scheme for wireless sensor networks , 2013, Inf. Sci..

[18]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.

[19]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[20]  Xuemai Gu,et al.  Design of Active Frequency Selective Surfaces for the RCS Reduction , 2013 .

[21]  Frank Mueller,et al.  Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.

[22]  Xingming Sun,et al.  Multi-mark: Multiple Watermarking Method for Privacy Data Protection in Wireless Sensor Networks , 2011 .

[23]  Bo Hu,et al.  A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.

[24]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[25]  Deepa Kundur,et al.  Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.

[26]  Miodrag Potkonjak,et al.  Real-time watermarking techniques for sensor networks , 2003, IS&T/SPIE Electronic Imaging.