Secure Data Transmission of Wireless Sensor Network Based on Information Hiding

Wireless sensor networks are self-organized and data-centric. Security is a critical issue in many applications. In order to protect the security of data, we propose a novel secure transmission strategy based on information hiding (IH). In this design, we acquire sensitive information securely so as to make use of the advantage of IH technique without encryption. Our approach deal with the weakness of limitation in sensor node resources and the security threats, it is suitable for stream data in sensor nodes. The simulation experiments also demonstrate that this approach is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Song Liu,et al.  Load shedding in stream databases: a control-based approach , 2006, VLDB.

[3]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[4]  John A. Stankovic,et al.  t-kernel: providing reliable OS support to wireless sensor networks , 2006, SenSys '06.

[5]  Sushil Jajodia,et al.  Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..

[6]  Miodrag Potkonjak,et al.  Real-time watermarking techniques for sensor networks , 2003, IS&T/SPIE Electronic Imaging.

[7]  Joshua R. Smith,et al.  ID Modulation: Embedding Sensor Data in an RFID Timeseries , 2005, Information Hiding.

[8]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[9]  Yunhao Liu,et al.  Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[10]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[11]  Nicholas F. Maxemchuk,et al.  Electronic document distribution , 1994, AT&T Technical Journal.

[12]  Alireza Keshavarz-Haddad,et al.  Broadcast capacity in multihop wireless networks , 2006, MobiCom '06.

[13]  Michael Stonebraker,et al.  Monitoring Streams - A New Class of Data Management Applications , 2002, VLDB.

[14]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[15]  John E. Kleider,et al.  Radio frequency watermarking for OFDM wireless networks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[16]  Yunhao Liu,et al.  Underground Structure Monitoring with Wireless Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[17]  Srinivasan Seshan,et al.  Self-management in chaotic wireless deployments , 2005, MobiCom '05.

[18]  Radu Sion,et al.  Rights protection for discrete numeric streams , 2006, IEEE Transactions on Knowledge and Data Engineering.

[19]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[20]  Choong Seon Hong,et al.  A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks , 2006, ICDCIT.