On protecting the integrity of sensor data

Wireless sensors typically operate in uncontrolled and possibly hostile environment. Thus, sensors have a high risk of being captured and compromised by an adversary. Traditional security schemes are computationally expensive, because they introduce overhead which shortens the life of the sensors. Watermarking schemes are usually light weight and do not require extensive computing and power resources in comparison with traditional security techniques. Thus they can be attractive alternative for wireless sensor applications. This paper proposes a fragile watermarking scheme S-SGW to provide integrity for sensor data. The proposed scheme is a simplification of a technique proposed by Guo et.al. for data streams. S-SGW requires less computing power than the original technique and thus; more suitable for WSNs. Yet it provides the same sensitivity to malicious updates. Data elements generated by sensors are organized into groups with variable sizes. A secret watermark is generated from every two consecutive groups. The watermark is then embedded in the earlier group by replacing the least significant bits in the data element. The security analysis S-SGW is similar to that of Guo et.al. technique, thus, the experimental section compares the performance and overhead of the two techniques. The experimental results show that watermark composition as well as the embedding and the extraction algorithms of the S-SGW are much faster than that of Guo et.al.

[1]  Sushil Jajodia,et al.  Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..

[2]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[3]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[4]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[5]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[6]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[7]  Minghua Chen,et al.  A fragile watermark error detection scheme for wireless video communications , 2005, IEEE Transactions on Multimedia.

[8]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[9]  Radu Sion,et al.  Resilient Rights Protection for Sensor Streams , 2004, VLDB.

[10]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[11]  Anupam Joshi,et al.  Security for wireless sensor networks , 2004 .

[12]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[13]  Sanjay Kumar Madria,et al.  Practical algorithm for data security (PADS) in wireless sensor networks , 2007, MobiDE '07.

[14]  Sushil Jajodia,et al.  A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..

[15]  Peter J. Haas,et al.  Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.

[16]  Frank Mueller,et al.  Encryption overhead in embedded systems and sensor network nodes: modeling and analysis , 2003, CASES '03.

[17]  Chun-Shien Lu,et al.  Multipurpose audio watermarking , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.