Research Article
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
Table 2
Notations and parameters of simulation.
| Parameter | Value |
| Surface of the network | | Num of sink node | 1 | Num of sensing node | 8 | Num of attacker node | 10 | Num of transmission node | 81 | Sink node location | (30, 60) | Routing protocol | LEACH | MAC protocol | S-MAC | Initial energy | 2 J |
|
|