ABSTRACT
The function of Wireless Sensor Networks (WSNs) is to collect and store data sent to other nodes or servers. Current technologies allow validation during transit, but stop after the data reaches its destination. One of the challenges with these technologies is to ensure that the source of the data is preserved, once it leaves the WSN. This is important as the data can be used by other applications or distributed to other parties. Therefore, it needs to be ensured that the data source is identifiable and the data is valid. Sensors are susceptible to various types of attack, such as data modification, data insertion and deletion, or even physical capture and sensor replacement. Hence, security becomes an important issue with WSNs. The traditional algorithms are used for securing data transmission between sensor nodes. However these algorithms need millions of multiplication instructions to perform operations, and cannot efficiently protect the copyright of the valuable sensor data. Watermarking is one of the effective choices to overcome this challenge. Watermark adds a second line of defense to ensure that the data is valid, even if someone cracks the encryption. This paper proposes a watermarking technique for copyright protection of data in WSNs. It also provides performance evaluation of the technique to show its robustness against various types of attacks, like data deletion, packet replication and Sybil attacks.
- Yick, J., B. Mukherjee, and D. Ghosal, Wireless sensor network survey. Computer Networks, 2008. 52(12): p. 2292--2330. Google ScholarDigital Library
- Wang, X.-Y., Z.-H. Xu, and H.-Y. Yang, A robust image watermarking algorithm using SVR detection. Expert Systems with Applications, 2009. 36(5): p. 9056--9064. Google ScholarDigital Library
- Potdar, V., Subjective and Objective Watermark Detection Using a Novel Approach--Barcode Watermarking ed. C.I.a. Security. 2007. 576. Google ScholarDigital Library
- Potdar V., Jones, C, Chang, E, Multiple image watermarking using the SILE approach, in Proceedings of the 6th WSEAS international conference on Multimedia systems; signal processing. 2006, World Scientific and Engineering Academy and Society (WSEAS): Hangzhou, China. Google ScholarDigital Library
- Fang Jessica, P., Miodrag Real-time watermarking techniques for sensor networks Proceedings-SPIE The International Society for optical Engineering 2003(ISSU 5020): p. 391--402Google Scholar
- F. Koushanfar, M. P., Watermarking Technique for Sensor Networks: Foundations and Applications. Book chapter, in 'Security in Sensor Networks', Yang Xiao 2007.Google Scholar
- Kamel, I., A Lightweight Data Integrity Scheme for Sensor Networks. Sensors, 2011. 11(4): p. 4118.Google Scholar
- Albath, J., Practical algorithm for data security (PADS) in wireless sensor networks Proceedings of the 6th CM international workshop on Data engineering for wireless and mobile access - MobiDE '07. 2007. 9. Google ScholarDigital Library
- Juma, H. K., I. Kaya, L. Watermarking sensor data for protecting the integrity. in Innovations in Information Technology, 2008. IIT 2008. International Conference on. 2008.Google ScholarCross Ref
- Rong, X., S. Xingming, and Y. Ying. Copyright Protection in Wireless Sensor Networks by Watermarking. in Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on. 2008. Google ScholarDigital Library
- Xiaomei, D. X., Li. An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks. in Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference on. 2009. Google ScholarDigital Library
- Jian, L. and H. Xiangjian. A Review Study on Digital Watermarking. in Information and Communication Technologies, 2005. ICICT 2005. First International Conference on. 2005.Google ScholarCross Ref
- Rakesh, A. and K. Jerry, Watermarking relational databases, in Proceedings of the 28th international conference on Very Large Data Bases. 2002, VLDB Endowment: Hong Kong.Google Scholar
- Sion, R., M. Atallah, and P. Sunil, Rights protection for relational data. Knowledge and Data Engineering, IEEE Transactions on, 2004. 16(12): p. 1509--1525. Google ScholarDigital Library
- Potdar, V. M., S. Han, and E. Chang. A survey of digital image watermarking techniques. in Industrial Informatics, 2005. INDIN '05. 2005 3rd IE EE International Conference on. 2005.Google ScholarCross Ref
- Radu, S., A. Mikhail, and P. Sunil, Resilient rights protection for sensor streams, in Proceedings of the Thirtieth international conference on Very large data bases - Volume 30. 2004, VLDB Endowment: Toronto, Canada. Google ScholarDigital Library
- Xiao, X., Sun, Xingming Lincong, Yang Minggang, Chen. Secure Data Transmission of Wireless Sensor Network Based on Information Hiding. in Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous 2007. Fourth Annual International Conference on. 2007. Google ScholarDigital Library
- Zhang, W., Liu, Y, Sajal K, Das Aggregation Supportive Authentication in Wireless Sensor Networks: A Watermark Based Approach. in World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a. 2007.Google ScholarCross Ref
- Xuejun, R., A sensitivity data communication protocol for WSN based on digital watermarking School of Information and Technology, Northwestern University, China, 2010.Google Scholar
- Kamel, I. A. K., O. Al Dakkak, A. Distortion-Free Watermarking Scheme for Wireless Sensor Networks. in Intelligent Networking and Collaborative Systems, 2009. INCOS '09. International Conference on. 2009. Google ScholarDigital Library
- Haowen, C. and A. Perrig, Security and privacy in sensor networks. Computer, 2003. 36(10): p. 103--105. Google ScholarDigital Library
- Adrian, P. R., Szewczyk J. D. Tygar Victor, Wen David, E. Culler, SPINS: security protocols for sensor networks. Wirel. Netw., 2002. 8(5): p. 521--534. Google ScholarDigital Library
- Bartosz, P., S. Dawn, and P. Adrian, SIA: secure information aggregation in sensor networks, in Proceedings of the 1st international conference on Embedded networked sensor systems. 2003, ACM: Los Angeles, California, USA. Google ScholarDigital Library
- Xiaolong, L., et al, A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks, in Computational Intelligence and Security, W. Yuping, C. Yiu-Ming, and L. Hailin, Editors. 2007, Springer-Verlag. p. 725--732.Google Scholar
- Yao, J., A security architecture for wireless sensor networks based-on public key cryptography2009 5th International Conference on Wireless Communications, Networking and Mobile Computing. 2009. 1. Google ScholarDigital Library
- Raghu, K. G. P., Jayachandran Haiyun, Luo Tarek, F. Abdelzaher, Datalink streaming in wireless sensor networks, in Proceedings of the 4th international conference on Embedded networked sensor systems. 2006, ACM: Boulder, Colorado, USA. Google ScholarDigital Library
- Shih, F., Zhang, M, Towards Supporting Contextual Privacy in Body Sensor Networks for Health Monitoring Service. W3C Workshop on Privacy and data usage control, 04/05 October 2010 Cambridge (MA).Google Scholar
- E. Dawson, J. A., P. Gray, Australasian Journal of Combinatorics 1(1990), pp. 53--65.Google Scholar
- Harjito, B., Watermarking Technique based on Linear Feed Back Shift Register (LFSR). Seminar Nasional Konferda ke -9 Himpunan Matematika Wilayah Jateng dan DIY di FMIPA UNS 2003.Google Scholar
- O'connor, J., and Roberstson, E. F. Andrew nikolaevich Kolmogorof school of mathematics and Statistics, university of St Andrews, Scotland, 1999.Google Scholar
- Koushanfar, F. and M. Potkonjak, Watermarking Technique for Sensor Networks: Foundations and Applications. Book chapter, in 'Security in Sensor Networks', Yang Xiao (ed.), Auerbach publications 2006.Google Scholar
- Wong, J. L., Feng, J, Kirovski, D, Potkonjack M, Security in sensor networks: watermarking techniques in Wireless sensor networks. 2004. 305. Google ScholarDigital Library
- Cox, I. J., Secure spread spectrum watermarking for multimedia. IEEE transactions on image processing, 1997. 6(12): p. 1673. Google ScholarDigital Library
- Potdar, V., Sharif, A., and Chang, E., 2011. Industrial Strength Wireless Multimedia Sensor Network Technology. In: B. M. Wilamowski & J. D. Irwin eds. 2011. Industrial Electronics Handbook. 2nd ed. Boca Raton, FL, USA: CRC Press. Ch. 11. ISBN: 978-1-4398028-9-2.Google Scholar
- Dillon, T., Talevski, A., Potdar, V., Chang, E., 2009. Web of things as a framework for ubi quitous intelligence and computing, In: Proceedings of the Ubiquitous Intelligence and Computing (UIC2009), Lecture Notes in Computer Science, vol. 5585, pp. 2--13. Google ScholarDigital Library
- Dillon, T., Potdar, V., Singh, J., Talevski, A., 2011. Cyber Physical Systems: Challenges in Sensor Actuator Networks, In: Proceedings of the 5th International Conference on Digital Ecosystems & Technologies (DEST2011), June 2011.Google Scholar
- Rathnayaka, A. J. D., Potdar, V., 2011. A Critical Analysis of Wireless Sensor Network Transport Layer Protocol, Journal of Network and Computer Applications.Google Scholar
- Sharif, A., Potdar, V., Chang, E., 2009. Wireless Multimedia Sensor Network Technology: A Survey. In: 7th IEEE International Conference on Industrial Informatics (INDIN 2009). Cardiff, UK, 2009, June 24--26.Google Scholar
- Potdar, V., Han, S., and Chang, E., 2005. Fingerprinted Secret Sharing Steganography for Robustness against Image Cropping Attacks. In: Proceedings of the 3rd IEEE International Conference on Industrial Informatics (INDIN '05). Perth, Australia, August 10--12Google Scholar
- Mohan, M., Potdar, V., and Chang, E., 2006. Recovering and Restoring Tampered RFID Data using Steganographic Principles. In: Proceeding of the 10th IEEE International Conference on Industrial Technology, (ICIT 2006). Mumbai, India, December 15--17.Google Scholar
- Potdar, V., Chang, E., 2006. Tamper Detection in RFID Tags using Fragile Watermarking. In: Proceeding of the 10th IEEE International Conference on Industrial Technology. Mumbai, India, December 15--17.Google ScholarCross Ref
- Yousuf, Y. Potdar, V., 2008. A Survey of RFID Authentication Protocols. In: 22nd International Conference on Advanced Information Networking and Applications -Workshops (AINAW 2008). Okinawa, Japan, Mar 25--28. Google ScholarDigital Library
- Potdar, V., Hayati, P., and Chang, E., 2007. Improving RFID Read Rate Reliability by a Systematic Error Detection Approach. In: 1st Annual RFID Eurasia Conference. Istanbul, Turkey, September 5--6.Google Scholar
- Han, S., Potdar, V., and Chang, E., 2007. Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor. In: 5th International Conference on Computational Science and Its Applications (ICCSA 2007), Malaysia, 26--29 Aug. Google ScholarDigital Library
- Potdar, V., Wu, C, Chang, E., 2005. Tamper detection for ubiquitous RFID enabled supply chain. In: Y. Hao et al. (Eds.):, Lecture Notes in Artificial Intelligence 3802, Springer-Verlag Berlin Heidelberg 2005, vol. 3802, no. 1, page(s): 273--278, Dec. 2005. Google ScholarDigital Library
- Potdar, V., and Chang, E. 2004. Disguising Text Cryptography Using Image Cryptography. In Proc. of the 4th International Network Conference (INC 2004), Plymouth, U. K, July 6--9.Google Scholar
- B Harjito, V Potdar, J Singh, Watermarking technique for wireless multimedia sensor networks: a state of the art, Proceedings of the CUBE International Information Technology Conference, Pune, India, Sept 3--5, pp. 832--840 Google ScholarDigital Library
- Han, S., G. Skinner, Potdar, V., and Chang, E., 2006. A Framework of Authentication and Authorization for e-Health Services. In: Proceedings of the 3rd ACM workshop on secure web services (ACM SWS). Alexandria, Virginia, USA, Oct 27--31. Google ScholarDigital Library
Index Terms
- Watermarking technique for copyright protection of wireless sensor network data using LFSR and Kolmogorov complexity
Recommendations
A copyright protection scheme for digital images using visual cryptography technique
A robust copyright protection scheme for digital image is proposed in the paper. In the proposed scheme, the watermark does not require to be embedded into the protected image but is used to generate a secret image and a public image by using the visual ...
Dual-wrapped digital watermarking scheme for image copyright protection
Digital watermarking is an effective way to protect the rightful ownership of multimedia contents. In this paper, a two-phase watermarking scheme is proposed, which extracts both the grayscale watermark and the binary one from the protected images to ...
Wireless Sensor Network Using ARM Processors: A Review in Hardware Perspective
The hardware design of Wireless Sensor Networks WSN is the crux of its effective deployment. Nowadays these networks are used in microscopic, secure and high-end embedded products. WSN's potentiality in terms of efficient data sensing and distributed ...
Comments