skip to main content
10.1145/2428955.2428995acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Watermarking technique for copyright protection of wireless sensor network data using LFSR and Kolmogorov complexity

Published:03 December 2012Publication History

ABSTRACT

The function of Wireless Sensor Networks (WSNs) is to collect and store data sent to other nodes or servers. Current technologies allow validation during transit, but stop after the data reaches its destination. One of the challenges with these technologies is to ensure that the source of the data is preserved, once it leaves the WSN. This is important as the data can be used by other applications or distributed to other parties. Therefore, it needs to be ensured that the data source is identifiable and the data is valid. Sensors are susceptible to various types of attack, such as data modification, data insertion and deletion, or even physical capture and sensor replacement. Hence, security becomes an important issue with WSNs. The traditional algorithms are used for securing data transmission between sensor nodes. However these algorithms need millions of multiplication instructions to perform operations, and cannot efficiently protect the copyright of the valuable sensor data. Watermarking is one of the effective choices to overcome this challenge. Watermark adds a second line of defense to ensure that the data is valid, even if someone cracks the encryption. This paper proposes a watermarking technique for copyright protection of data in WSNs. It also provides performance evaluation of the technique to show its robustness against various types of attacks, like data deletion, packet replication and Sybil attacks.

References

  1. Yick, J., B. Mukherjee, and D. Ghosal, Wireless sensor network survey. Computer Networks, 2008. 52(12): p. 2292--2330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Wang, X.-Y., Z.-H. Xu, and H.-Y. Yang, A robust image watermarking algorithm using SVR detection. Expert Systems with Applications, 2009. 36(5): p. 9056--9064. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Potdar, V., Subjective and Objective Watermark Detection Using a Novel Approach--Barcode Watermarking ed. C.I.a. Security. 2007. 576. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Potdar V., Jones, C, Chang, E, Multiple image watermarking using the SILE approach, in Proceedings of the 6th WSEAS international conference on Multimedia systems; signal processing. 2006, World Scientific and Engineering Academy and Society (WSEAS): Hangzhou, China. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Fang Jessica, P., Miodrag Real-time watermarking techniques for sensor networks Proceedings-SPIE The International Society for optical Engineering 2003(ISSU 5020): p. 391--402Google ScholarGoogle Scholar
  6. F. Koushanfar, M. P., Watermarking Technique for Sensor Networks: Foundations and Applications. Book chapter, in 'Security in Sensor Networks', Yang Xiao 2007.Google ScholarGoogle Scholar
  7. Kamel, I., A Lightweight Data Integrity Scheme for Sensor Networks. Sensors, 2011. 11(4): p. 4118.Google ScholarGoogle Scholar
  8. Albath, J., Practical algorithm for data security (PADS) in wireless sensor networks Proceedings of the 6th CM international workshop on Data engineering for wireless and mobile access - MobiDE '07. 2007. 9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Juma, H. K., I. Kaya, L. Watermarking sensor data for protecting the integrity. in Innovations in Information Technology, 2008. IIT 2008. International Conference on. 2008.Google ScholarGoogle ScholarCross RefCross Ref
  10. Rong, X., S. Xingming, and Y. Ying. Copyright Protection in Wireless Sensor Networks by Watermarking. in Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Xiaomei, D. X., Li. An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks. in Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference on. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jian, L. and H. Xiangjian. A Review Study on Digital Watermarking. in Information and Communication Technologies, 2005. ICICT 2005. First International Conference on. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  13. Rakesh, A. and K. Jerry, Watermarking relational databases, in Proceedings of the 28th international conference on Very Large Data Bases. 2002, VLDB Endowment: Hong Kong.Google ScholarGoogle Scholar
  14. Sion, R., M. Atallah, and P. Sunil, Rights protection for relational data. Knowledge and Data Engineering, IEEE Transactions on, 2004. 16(12): p. 1509--1525. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Potdar, V. M., S. Han, and E. Chang. A survey of digital image watermarking techniques. in Industrial Informatics, 2005. INDIN '05. 2005 3rd IE EE International Conference on. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  16. Radu, S., A. Mikhail, and P. Sunil, Resilient rights protection for sensor streams, in Proceedings of the Thirtieth international conference on Very large data bases - Volume 30. 2004, VLDB Endowment: Toronto, Canada. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Xiao, X., Sun, Xingming Lincong, Yang Minggang, Chen. Secure Data Transmission of Wireless Sensor Network Based on Information Hiding. in Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous 2007. Fourth Annual International Conference on. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Zhang, W., Liu, Y, Sajal K, Das Aggregation Supportive Authentication in Wireless Sensor Networks: A Watermark Based Approach. in World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a. 2007.Google ScholarGoogle ScholarCross RefCross Ref
  19. Xuejun, R., A sensitivity data communication protocol for WSN based on digital watermarking School of Information and Technology, Northwestern University, China, 2010.Google ScholarGoogle Scholar
  20. Kamel, I. A. K., O. Al Dakkak, A. Distortion-Free Watermarking Scheme for Wireless Sensor Networks. in Intelligent Networking and Collaborative Systems, 2009. INCOS '09. International Conference on. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Haowen, C. and A. Perrig, Security and privacy in sensor networks. Computer, 2003. 36(10): p. 103--105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Adrian, P. R., Szewczyk J. D. Tygar Victor, Wen David, E. Culler, SPINS: security protocols for sensor networks. Wirel. Netw., 2002. 8(5): p. 521--534. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Bartosz, P., S. Dawn, and P. Adrian, SIA: secure information aggregation in sensor networks, in Proceedings of the 1st international conference on Embedded networked sensor systems. 2003, ACM: Los Angeles, California, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Xiaolong, L., et al, A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks, in Computational Intelligence and Security, W. Yuping, C. Yiu-Ming, and L. Hailin, Editors. 2007, Springer-Verlag. p. 725--732.Google ScholarGoogle Scholar
  25. Yao, J., A security architecture for wireless sensor networks based-on public key cryptography2009 5th International Conference on Wireless Communications, Networking and Mobile Computing. 2009. 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Raghu, K. G. P., Jayachandran Haiyun, Luo Tarek, F. Abdelzaher, Datalink streaming in wireless sensor networks, in Proceedings of the 4th international conference on Embedded networked sensor systems. 2006, ACM: Boulder, Colorado, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Shih, F., Zhang, M, Towards Supporting Contextual Privacy in Body Sensor Networks for Health Monitoring Service. W3C Workshop on Privacy and data usage control, 04/05 October 2010 Cambridge (MA).Google ScholarGoogle Scholar
  28. E. Dawson, J. A., P. Gray, Australasian Journal of Combinatorics 1(1990), pp. 53--65.Google ScholarGoogle Scholar
  29. Harjito, B., Watermarking Technique based on Linear Feed Back Shift Register (LFSR). Seminar Nasional Konferda ke -9 Himpunan Matematika Wilayah Jateng dan DIY di FMIPA UNS 2003.Google ScholarGoogle Scholar
  30. O'connor, J., and Roberstson, E. F. Andrew nikolaevich Kolmogorof school of mathematics and Statistics, university of St Andrews, Scotland, 1999.Google ScholarGoogle Scholar
  31. Koushanfar, F. and M. Potkonjak, Watermarking Technique for Sensor Networks: Foundations and Applications. Book chapter, in 'Security in Sensor Networks', Yang Xiao (ed.), Auerbach publications 2006.Google ScholarGoogle Scholar
  32. Wong, J. L., Feng, J, Kirovski, D, Potkonjack M, Security in sensor networks: watermarking techniques in Wireless sensor networks. 2004. 305. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Cox, I. J., Secure spread spectrum watermarking for multimedia. IEEE transactions on image processing, 1997. 6(12): p. 1673. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Potdar, V., Sharif, A., and Chang, E., 2011. Industrial Strength Wireless Multimedia Sensor Network Technology. In: B. M. Wilamowski & J. D. Irwin eds. 2011. Industrial Electronics Handbook. 2nd ed. Boca Raton, FL, USA: CRC Press. Ch. 11. ISBN: 978-1-4398028-9-2.Google ScholarGoogle Scholar
  35. Dillon, T., Talevski, A., Potdar, V., Chang, E., 2009. Web of things as a framework for ubi quitous intelligence and computing, In: Proceedings of the Ubiquitous Intelligence and Computing (UIC2009), Lecture Notes in Computer Science, vol. 5585, pp. 2--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Dillon, T., Potdar, V., Singh, J., Talevski, A., 2011. Cyber Physical Systems: Challenges in Sensor Actuator Networks, In: Proceedings of the 5th International Conference on Digital Ecosystems & Technologies (DEST2011), June 2011.Google ScholarGoogle Scholar
  37. Rathnayaka, A. J. D., Potdar, V., 2011. A Critical Analysis of Wireless Sensor Network Transport Layer Protocol, Journal of Network and Computer Applications.Google ScholarGoogle Scholar
  38. Sharif, A., Potdar, V., Chang, E., 2009. Wireless Multimedia Sensor Network Technology: A Survey. In: 7th IEEE International Conference on Industrial Informatics (INDIN 2009). Cardiff, UK, 2009, June 24--26.Google ScholarGoogle Scholar
  39. Potdar, V., Han, S., and Chang, E., 2005. Fingerprinted Secret Sharing Steganography for Robustness against Image Cropping Attacks. In: Proceedings of the 3rd IEEE International Conference on Industrial Informatics (INDIN '05). Perth, Australia, August 10--12Google ScholarGoogle Scholar
  40. Mohan, M., Potdar, V., and Chang, E., 2006. Recovering and Restoring Tampered RFID Data using Steganographic Principles. In: Proceeding of the 10th IEEE International Conference on Industrial Technology, (ICIT 2006). Mumbai, India, December 15--17.Google ScholarGoogle Scholar
  41. Potdar, V., Chang, E., 2006. Tamper Detection in RFID Tags using Fragile Watermarking. In: Proceeding of the 10th IEEE International Conference on Industrial Technology. Mumbai, India, December 15--17.Google ScholarGoogle ScholarCross RefCross Ref
  42. Yousuf, Y. Potdar, V., 2008. A Survey of RFID Authentication Protocols. In: 22nd International Conference on Advanced Information Networking and Applications -Workshops (AINAW 2008). Okinawa, Japan, Mar 25--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Potdar, V., Hayati, P., and Chang, E., 2007. Improving RFID Read Rate Reliability by a Systematic Error Detection Approach. In: 1st Annual RFID Eurasia Conference. Istanbul, Turkey, September 5--6.Google ScholarGoogle Scholar
  44. Han, S., Potdar, V., and Chang, E., 2007. Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor. In: 5th International Conference on Computational Science and Its Applications (ICCSA 2007), Malaysia, 26--29 Aug. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Potdar, V., Wu, C, Chang, E., 2005. Tamper detection for ubiquitous RFID enabled supply chain. In: Y. Hao et al. (Eds.):, Lecture Notes in Artificial Intelligence 3802, Springer-Verlag Berlin Heidelberg 2005, vol. 3802, no. 1, page(s): 273--278, Dec. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Potdar, V., and Chang, E. 2004. Disguising Text Cryptography Using Image Cryptography. In Proc. of the 4th International Network Conference (INC 2004), Plymouth, U. K, July 6--9.Google ScholarGoogle Scholar
  47. B Harjito, V Potdar, J Singh, Watermarking technique for wireless multimedia sensor networks: a state of the art, Proceedings of the CUBE International Information Technology Conference, Pune, India, Sept 3--5, pp. 832--840 Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Han, S., G. Skinner, Potdar, V., and Chang, E., 2006. A Framework of Authentication and Authorization for e-Health Services. In: Proceedings of the 3rd ACM workshop on secure web services (ACM SWS). Alexandria, Virginia, USA, Oct 27--31. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Watermarking technique for copyright protection of wireless sensor network data using LFSR and Kolmogorov complexity

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        MoMM '12: Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
        December 2012
        323 pages
        ISBN:9781450313070
        DOI:10.1145/2428955

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 December 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader