Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 3126010, 12 pages
https://doi.org/10.1155/2017/3126010
Research Article

A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

1School of Computer Science and Technology, Harbin Engineering University, Heilongjiang, Harbin, China
2Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

Correspondence should be addressed to Jianguo Sun; nc.ude.uebrh@ougnaijnus

Received 19 May 2017; Revised 31 August 2017; Accepted 17 September 2017; Published 30 October 2017

Academic Editor: Rongxing Lu

Copyright © 2017 Guoyin Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. Miorandi, S. Sicari, F. de Pellegrini, and I. Chlamtac, “Internet of things: vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, “A vision of IoT: Applications, challenges, and opportunities with China Perspective,” IEEE Internet of Things Journal, vol. 1, no. 4, pp. 349–359, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. J. S. Kumar and D. R. Patel, “A survey on internet of things: security and privacy issues,” International Journal of Computer Applications, vol. 90, no. 11, pp. 20–26, 2014. View at Publisher · View at Google Scholar
  4. A. K. Pathan, H.-W. Lee, and C. S. Hong, “Security in wireless sensor networks: issues and challenges,” in Proceedings of the 8th International Conference Advanced Communication Technology (ICACT '06), vol. 2, pp. 1043–1048, Phoenix Park, Ireland, February 2006. View at Publisher · View at Google Scholar · View at Scopus
  5. X. Dong and X. Li, “An authentication method for self nodes based on watermarking in wireless sensor networks,” in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009, Beijing, China, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. B. Przydatek, D. Song, and A. Perrig, “SIA: secure information aggregation in sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03), pp. 255–265, ACM, November 2003. View at Scopus
  7. C. Karlof, N. Sastry, and D. Wagner, “TinySec: a link layer security architecture for wireless sensor networks,” in Proceedings of the Second International Conference on Embedded Networked Sensor Systems (SenSys '04), pp. 162–175, November 2004. View at Scopus
  8. X. Ren and H. Yu, “Security mechanisms for wireless sensor networks,” Journal of Computer Science and Network Security, vol. 6, no. 3, pp. 155-156, 2006. View at Google Scholar
  9. D. E. Boubiche, S. Boubiche, H. Toral-Cruz, A.-S. K. Pathan, A. Bilami, and S. Athmani, “SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs,” Telecommunication Systems, vol. 62, no. 2, pp. 277–288, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” in Proceedings of the IEEE International Conference Image Processing (ICIP '94), vol. 2, pp. 86–90, Austin, Tex, USA, November 1994. View at Publisher · View at Google Scholar
  11. C. Fei, D. Kundur, and R. H. Kwong, “Analysis and design of secure watermark-based authentication systems,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 43–55, 2006. View at Publisher · View at Google Scholar · View at Scopus
  12. I. Cox, M. Miller, J. Bloom, and J. Fridrich, Digital Watermarking and Steganography, Morgan Kaufmann, 2007.
  13. P. F. Luis, C. Pedro et al., Watermarking Security: A Survey, Transactions on Data Hiding and Multimedia Security I, Springer, Berlin Heidelberg, 2006.
  14. W. Li, H. Song, and F. Zeng, “Policy-based secure and trustworthy sensing for internet of things in smart cities,” IEEE Internet of Things Journal, vol. PP, no. 99, pp. 1–1, 2017. View at Publisher · View at Google Scholar
  15. W. Li and H. Song, “ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 4, pp. 960–969, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Anbuchelian, S. Lokesh, and M. Baskaran, “Improving security in Wireless Sensor Network using trust and metaheuristic algorithms,” in Proceedings of the 3rd International Conference on Computer and Information Sciences, ICCOINS 2016, pp. 233–241, August 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Feng and M. Potkonjak, “Real-time watermarking techniques for sensor networks,” in Proceedings of the Security and Watermarking of Multimedia Contents V, pp. 391–402, January 2003. View at Publisher · View at Google Scholar · View at Scopus
  18. H. Guo, Y. Li, and S. Jajodia, “Chaining watermarks for detecting malicious modifications to streaming data,” Information Sciences, vol. 177, no. 1, pp. 281–298, 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. I. Kamel and H. Juma, “Simplified watermarking scheme for sensor networks,” International Journal of Internet Protocol Technology, vol. 5, no. 1-2, pp. 101–111, 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. I. Kamel and H. Juma, “A lightweight data integrity scheme for sensor networks,” Sensors, vol. 11, no. 4, pp. 4118–4136, 2011. View at Publisher · View at Google Scholar
  21. X. Shi and D. Xiao, “A reversible watermarking authentication scheme for wireless sensor networks,” Information Sciences, vol. 240, pp. 173–183, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. B. Wang, X. Sun, Z. Ruan, and H. Ren, “Multi-mark: Multiple watermarking method for privacy data protection in wireless sensor networks,” Information Technology Journal, vol. 10, no. 4, pp. 833–840, 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. I. Kamel, O. A. Koky, and A. A. Dakkak, “Distortion-free watermarking scheme for wireless sensor networks,” in Proceedings of the International Conference on Intelligent Networking and Collaborative Systems, INCoS 2009, pp. 135–140, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  24. X. Sun, J. Su, B. Wang, and Q. Liu, “Digital watermarking method for data integrity protection in wireless sensor networks,” International Journal of Security and Its Applications, vol. 7, no. 4, pp. 407–416, 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, “Analyzing and modeling encryption overhead for sensor network nodes,” in Proceedings of the Second ACM International Workshop on Wireless Sensor Networks and Applications, WSNA 2003, pp. 151–159, September 2003. View at Scopus
  26. M. A. Simplício Jr., P. S. L. M. Barreto, C. B. Margi, and T. C. M. B. Carvalho, “A survey on key management mechanisms for distributed Wireless Sensor Networks,” Computer Networks, vol. 54, no. 15, pp. 2591–2612, 2010. View at Publisher · View at Google Scholar · View at Scopus