Research Article

A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

Table 1

Notations and parameters of algorithm.

NotationDescription

The given one-way hash function SHA-1
The concatenation operator
The random position function
The data collecting time
The time queue stored in the sink node
The length of watermark embedding bits
The secret key
The sensed data element
The serial number inserted in each packet
Watermark to be inserted
The extracted watermark
The regenerated watermark