A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things

被引:38
作者
Wang, Baowei [1 ,2 ]
Kong, Weiwen [1 ]
Li, Wei [1 ]
Xiong, Neal N. [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[2] Fujian Prov Educ Dept, Engn Res Ctr Elect Informat & Control, Fuzhou 350108, Fujian, Peoples R China
[3] Northeastern State Univ, Dept Math & Comp Sci, Tahlequah, OK USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2019年 / 58卷 / 03期
基金
中国国家自然科学基金; 国家重点研发计划; 中国国家社会科学基金;
关键词
Dual-chaining; reversible watermark; integrity authentication; Internet of things; AUTHENTICATION SCHEME; REVERSIBLE WATERMARK; SENSOR;
D O I
10.32604/cmc.2019.06106
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment, especially in resource-constrained sensor networks, such as the perception layer of Internet of Things applications. However, in all existing single chaining watermark schemes, how to ensure the synchronization between the data sender and the receiver is still an unsolved problem. Once the synchronization points are attacked by the adversary, existing data integrity authentication schemes are difficult to work properly, and the false negative rate might be up to 50 percent. And the additional fixed group delimiters not only increase the data size, but are also easily detected by adversaries. In this paper, we propose an effective dual-chaining watermark scheme, called DCW, for data integrity protection in smart campus IoT applications. The proposed DCW scheme has the following three characteristics: (1) In order to authenticate the integrity of the data, fragile watermarks are generated and embedded into the data in a chaining way using dynamic grouping; (2) Instead of additional fixed group delimiters, chained watermark delimiters are proposed to synchronize the both transmission sides in case of the synchronization points are tampered; (3) To achieve lossless integrity authentication, a reversible watermarking technique is applied. The experimental results and security analysis can prove that the proposed DCW scheme is able to effectively authenticate the integrity of the data with free distortion at low cost in our smart meteorological Internet of Things system.
引用
收藏
页码:679 / 695
页数:17
相关论文
共 20 条
[1]   Reversible watermark using the difference expansion of a generalized integer transform [J].
Alattar, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (08) :1147-1156
[2]   Reversible watermarking method based on asymmetric-histogram shifting of prediction errors [J].
Chen, Xianyi ;
Sun, Xingming ;
Sun, Huiyu ;
Zhou, Zhili ;
Zhang, Jianjun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (10) :2620-2626
[3]  
Dong Xiangyu., 2009, SC 09 P C HIGH PERFO, P1, DOI DOI 10.1145/1654059.1654117
[4]  
Feng J, 2003, PROC SPIE, V5020, P391, DOI 10.1117/12.479736
[5]   Chaining watermarks for detecting malicious modifications to streaming data [J].
Guo, Huiping ;
Li, Yingjiu ;
Jajodia, Sushil .
INFORMATION SCIENCES, 2007, 177 (01) :281-298
[6]  
Juma Hussam, 2008, IIT 2008 International Conference on Innovations in Information Technology, P598, DOI 10.1109/INNOVATIONS.2008.4781662
[7]   A Lightweight Data Integrity Scheme for Sensor Networks [J].
Kamel, Ibrahim ;
Juma, Hussam .
SENSORS, 2011, 11 (04) :4118-4136
[8]   Simplified watermarking scheme for sensor networks [J].
Kamel, Ibrahim ;
Juma, Hussam .
INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2010, 5 (1-2) :101-111
[9]   A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks [J].
Liu, Xiyao ;
Ge, Yu ;
Zhu, Yuesheng ;
Wu, Dajun .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12) :4643-4660
[10]  
Qiu Y., 2017, COMPUTERS MAT CONTIN, V55, P151