Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach

Wireless Sensor Networks are emerging as an innovative technology that can revolutionize and improve our daily lives. Nevertheless, the use of such a technology raises new chal- lenges regarding the development of reliable and secure sys- tems. Securing WSN is thus imperative and challenging. Un- fortunately, the conventional security measures based on data encryption are not well suitable to WSNs due to energy and computational resource constraints. However, watermarking techniques usually have light requirements of resource. This paper proposes a new fully distributed watermarking ap- proach for WSNs. This approach is focused on ensuring in- tegrity and authenticity of data. Moreover, in our approach watermark payload and computational complexity are low. The proposed approach is implemented and simulated with the CupCarbon simulator. The simulation results show that the proposed method is energy efficient.

[1]  B. Kumar,et al.  Identification of Packet Dropping and Modification in Wireless Sensor Networks , 2013 .

[2]  M. Tahar Kechadi,et al.  CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool , 2014, SimuTools.

[3]  Xing Xin,et al.  A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization , 2015, J. Vis. Commun. Image Represent..

[4]  Ibrahim Kamel,et al.  A Lightweight Data Integrity Scheme for Sensor Networks , 2011, Sensors.

[5]  Xingming Sun,et al.  A Reversible Watermarking Scheme Based on Difference Expansion for Wireless Sensor Networks , 2015 .

[6]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[7]  Vidyasagar Potdar,et al.  Secure Transmission in Wireless Sensor Networks Data Using Linear Kolmogorov Watermarking Technique , 2014, ArXiv.

[8]  Jaipal Singh,et al.  Watermarking technique for wireless multimedia sensor networks: a state of the art , 2012, CUBE.

[9]  Jian Shen,et al.  A Copyright Protection Method for Wireless Sensor Networks Based on Digital Watermarking , 2015 .

[10]  Xiaohua Li,et al.  An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[11]  Ioan-Catalin Dragoi,et al.  On Local Prediction Based Reversible Watermarking , 2015, IEEE Transactions on Image Processing.

[12]  R. Bulli Babu,et al.  Digital Data Theft Detection using Watermarking , 2015 .

[13]  Xingming Sun,et al.  Multi-mark: Multiple Watermarking Method for Privacy Data Protection in Wireless Sensor Networks , 2011 .

[14]  Lamri Laouamer,et al.  A Semi-Blind Robust DCT Watermarking Approach for Sensitive Text Images , 2015 .

[15]  Xingming Sun,et al.  Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks , 2013 .

[16]  Miodrag Potkonjak,et al.  Security in sensor networks: watermarking techniques , 2004 .

[17]  Lamri Laouamer,et al.  New Images Watermarking Scheme Based on Singular Value Decomposition , 2013, J. Inf. Hiding Multim. Signal Process..