Semi-fragile watermark for sensor data

被引:1
作者
Kamel, Ibrahim [1 ]
AlKoky, Osama [2 ]
机构
[1] Univ Sharjah, Dept Comp Engn, POB 27272, Sharjah, U Arab Emirates
[2] Univ Sharjah, Dept Comp Sci, Sharjah, U Arab Emirates
关键词
information security; digital watermarking; data integrity; sensor networks; secured hashing; data streams;
D O I
10.1504/IJIPT.2011.043676
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a novel semi-fragile watermarking technique for sensor data. The proposed watermarking technique embeds the secret watermark in the order of the data readings rather than the data values themselves, thus, does not cause distortion to the transmitted data values. Transmitted data readings are organised in groups of fixed length. The watermarking algorithm then reorders data readings relative to each other according to the value of the secret watermark. The proposed scheme tolerates minor changes that might be caused by channel error. In case of a single attack, the proposed technique can identify the victim element with high probability. The paper provides detailed security analysis to show the robustness of the proposed techniques against various types of attacks. Extensive experiments are performed to measure the attack detection and victim identification rate. The execution time of the watermark embedding and integrity check is also shown.
引用
收藏
页码:156 / 171
页数:16
相关论文
共 24 条
  • [1] Aggarwal G., 2004, US Patent, Patent No. 6834344
  • [2] Agrawal R, 2003, VLDB J, V12, P157, DOI [10.1007/s00778-003-0097-x, 10.1007/s000778-003-0097-x]
  • [3] Albath J., 2007, P 6 ACM INT WORKSH D, P9
  • [4] A STATISTICAL MODEL OF FLICKER NOISE
    BARNES, JA
    ALLAN, DW
    [J]. PROCEEDINGS OF THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, 1966, 54 (02): : 176 - &
  • [5] Data integrity protocol for sensor networks
    Durresi, A
    Paruchuri, V
    Kannan, R
    Iyengar, SS
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2005, 1 (02): : 205 - 214
  • [6] Query-Preserving Watermarking of Relational Databases and XML Documents
    Gross-Amblard, David
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2011, 36 (01):
  • [7] Chaining watermarks for detecting malicious modifications to streaming data
    Guo, Huiping
    Li, Yingjiu
    Jajodia, Sushil
    [J]. INFORMATION SCIENCES, 2007, 177 (01) : 281 - 298
  • [8] Guyeux C., 2010, P 2010 INT C SEC CRY, P1
  • [9] Hamadou A., 2011, INT J DIGIT CONTENT, V5, DOI DOI 10.4156/JDCTA.VOL5.ISSUE5.21
  • [10] A Cluster-Based Watermarking Technique for Relational Database
    Huang, Kaiyin
    Yue, Min
    Chen, Pengfei
    He, Yanshan
    Chen, Xiaoyun
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 107 - +