Semi-fragile watermark for sensor data

被引:1
作者
Kamel, Ibrahim [1 ]
AlKoky, Osama [2 ]
机构
[1] Univ Sharjah, Dept Comp Engn, POB 27272, Sharjah, U Arab Emirates
[2] Univ Sharjah, Dept Comp Sci, Sharjah, U Arab Emirates
关键词
information security; digital watermarking; data integrity; sensor networks; secured hashing; data streams;
D O I
10.1504/IJIPT.2011.043676
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a novel semi-fragile watermarking technique for sensor data. The proposed watermarking technique embeds the secret watermark in the order of the data readings rather than the data values themselves, thus, does not cause distortion to the transmitted data values. Transmitted data readings are organised in groups of fixed length. The watermarking algorithm then reorders data readings relative to each other according to the value of the secret watermark. The proposed scheme tolerates minor changes that might be caused by channel error. In case of a single attack, the proposed technique can identify the victim element with high probability. The paper provides detailed security analysis to show the robustness of the proposed techniques against various types of attacks. Extensive experiments are performed to measure the attack detection and victim identification rate. The execution time of the watermark embedding and integrity check is also shown.
引用
收藏
页码:156 / 171
页数:16
相关论文
共 24 条
  • [11] Simplified watermarking scheme for sensor networks
    Kamel, Ibrahim
    Juma, Hussam
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2010, 5 (1-2) : 101 - 111
  • [12] A schema for protecting the integrity of databases
    Kamel, Ibrahim
    [J]. COMPUTERS & SECURITY, 2009, 28 (07) : 698 - 709
  • [13] A robust software watermarking for copyright protection
    Kamel, Ibrahim
    Albluwi, Qutaiba
    [J]. COMPUTERS & SECURITY, 2009, 28 (06) : 395 - 409
  • [14] Karlof C., 2004, P 2 INT C EMB NETW S, P162, DOI DOI 10.1145/1031495.1031515
  • [15] Robust video watermarking based on affine invariant regions in the compressed domain
    Ling, Hefei
    Wang, Liyun
    Zou, Fuhao
    Lu, Zhengding
    Li, Ping
    [J]. SIGNAL PROCESSING, 2011, 91 (08) : 1863 - 1875
  • [16] Luo M., 2011, IEEE T IMAGE PROCESS, V99, P1
  • [17] Ma XH, 2006, PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P2434
  • [18] Ou B, 2011, LECT NOTES COMPUT SC, V6526, P170, DOI 10.1007/978-3-642-18405-5_14
  • [19] SPINS: Security protocols for sensor networks
    Perrig, A
    Szewczyk, R
    Tygar, JD
    Wen, V
    Culler, DE
    [J]. WIRELESS NETWORKS, 2002, 8 (05) : 521 - 534
  • [20] Sion R, 2004, P 30 INT C VER LARG, P732