Research Article
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
Table 3
The detection rate under various attacks.
| Attack type | Experiments num | Detection rate ( |
| Packet tampering | 50 | 100 | Packet forgery | 50 | 100 | Selective forwarding | 50 | 100 | Packet replay | 50 | 100 | Transfer delay | 50 | 100 |
|
|