Secure localisation of wireless devices with application to sensor networks using steganography

被引:9
作者
Tondwalkar, Ankita [1 ]
Vinayakray-Jani, Preetida [1 ]
机构
[1] SPIT, Dept Elect & Telecommun Engn, Bombay 400034, Maharashtra, India
来源
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015 | 2016年 / 78卷
关键词
Localisation; security; LSB; Cluster-head; node-id; Steganography; stego-image; cover-image;
D O I
10.1016/j.procs.2016.02.107
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The data collected from the sensor network is meaningful to most of the wireless sensor network applications if and only if it is coupled with the exact positioning of the node. Mere localisation solves the problem of locating an unknown node, however applications like battlefield surveillance or enemy tracking, rescue-operations as well as monitoring of military facilities demand security and reliability of the location information. Therefore secure localisation of non-reference nodes facilitates the localisation system to be robust and secure in adversarial circumstances. The work targets secure localisation of the node position using least significant bit (LSB) insertion technique of steganography. In order for a node to be aware of its position, it sends a cover-image along with the node-id to the Cluster head (CH). The CH which already knows the node position performs LSB embedding on the cover image to generate a stego-image. The stego-image and the cover-image are then compared to get secure position information. The comparison will yield accurate position information only if the cover image is the same. For an adversarial circumstance (different cover image), the security mechanism is robust, and the information will be conveyed to the intended recipient only. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:610 / 616
页数:7
相关论文
共 17 条
[1]  
[Anonymous], SIGNAL IMAGE PROCESS
[2]  
Chiu Wei-Yu, 2005, INFOCOM 24 ANN JOINT, V3
[3]  
De Cauwer Peter, 2010, SYSTEMS NETWORKS COM, P31
[4]  
Hopper N. J., 2009, IEEE T COMPUTERS, V58
[5]  
Jiang Jinfang, 2011, J COMMUNICATIONS, V6
[6]  
Kamal A H M, 2013, INT J COMPUTERS TECH, V4
[7]  
Kumar Mohan, 2014, INT J INFINITE INNOV, V3
[8]  
Md Amiruzzaman, 2010, INT J MULTIMEDIA UBI, V5
[9]  
Pandya Mahimn, 2013, International Journal of Computer Network and Information Security, V5, P40, DOI 10.5815/ijcnis.2013.05.05
[10]  
Radhakrishnan R, 2002, PROCEEDINGS OF THE 2002 IEEE WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, P339