Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 3126010, 12 pages
Research Article

A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

1School of Computer Science and Technology, Harbin Engineering University, Heilongjiang, Harbin, China
2Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

Correspondence should be addressed to Jianguo Sun; nc.ude.uebrh@ougnaijnus

Received 19 May 2017; Revised 31 August 2017; Accepted 17 September 2017; Published 30 October 2017

Academic Editor: Rongxing Lu

Copyright © 2017 Guoyin Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Since its introduction, IoT (Internet of Things) has enjoyed vigorous support from governments and research institutions around the world, and remarkable achievements have been obtained. The perception layer of IoT plays an important role as a link between the IoT and the real world; the security has become a bottleneck restricting the further development of IoT. The perception layer is a self-organizing network system consisting of various resource-constrained sensor nodes through wireless communication. Accordingly, the costly encryption mechanism cannot be applied to the perception layer. In this paper, a novel lightweight data integrity protection scheme based on fragile watermark is proposed to solve the contradiction between the security and restricted resource of perception layer. To improve the security, we design a position random watermark (PRW) strategy to calculate the embedding position by temporal dynamics of sensing data. The digital watermark is generated by one-way hash function SHA-1 before embedding to the dynamic computed position. In this way, the security vulnerabilities introduced by fixed embedding position can not only be solved effectively, but also achieve zero disturbance to the data. The security analysis and simulation results show that the proposed scheme can effectively ensure the integrity of the data at low cost.