Research Article

A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

Table 2

Notations and parameters of simulation.

ParameterValue

Surface of the network
Num of sink node1
Num of sensing node8
Num of attacker node10
Num of transmission node81
Sink node location(30, 60)
Routing protocolLEACH
MAC protocolS-MAC
Initial energy2 J