Research Article
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
Table 1
Notations and parameters of algorithm.
| Notation | Description |
| | The given one-way hash function SHA-1 | | The concatenation operator | | The random position function | | The data collecting time | | The time queue stored in the sink node | | The length of watermark embedding bits | | The secret key | | The sensed data element | | The serial number inserted in each packet | | Watermark to be inserted | | The extracted watermark | | The regenerated watermark |
|
|