An Improved Watermarking Scheme for Secure Data Aggregation in WSNs

Article Preview

Abstract:

Digital watermarking technology has already been used for secure data aggregation in wireless sensor networks. However, most of the existing watermarking technologies are irreversible, and the embedded watermark will cause some damage to the data collected by sensors. In this paper, we proposed a novel distributed reversible watermarking technology based on an improved difference expansion scheme. Due to the hierarchical clustering architecture organized according to LEACH protocol, a distributed self-organized mechanism is established within clusters for the watermark generation. The whole watermark is split into several segments and the watermark segments are assigned randomly to different sensors within a group. In addition, a pair of synchronized random sequence generators is applied on both the sensors and the sink to fresh the data.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

6298-6301

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Cox I J, Miller M L, Bloom J A, et al. Digital Watermarking and Steganography, Burlington: Morgan Kauffman, 2008, pp.375-422.

Google Scholar

[2] Fridrieh J, Goljan M, Du R, Invertible authentication, in: Proceedings of Security and Watermarking of Multimedia Contents III. San Jose: SPIE, 2001, pp.197-208.

DOI: 10.1117/12.435400

Google Scholar

[3] Chin-Feng Lee, Hsing-Ling Chenb, Hao-Kuan Tsoc, Embedding capacity raising in reversible data hiding based on prediction of difference expansion, in: Journal of Systems and Software, Vol. 83, 2010: 1864-1872.

DOI: 10.1016/j.jss.2010.05.078

Google Scholar

[4] J. Tian, Reversible Data Embedding Using a Difference Expansion, in: IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13 No. 8, 2003: 890-896.

DOI: 10.1109/tcsvt.2003.815962

Google Scholar

[5] J. Yick, B. Mukherjee, D. Ghosal, Wireless sensor network survey, in: Computer Networks, 52(12), 2008: 2292-2330.

DOI: 10.1016/j.comnet.2008.04.002

Google Scholar

[6] B. Wang, X. Sun and H. Ren, Multi-mark: Multiple Watermarking Method for Privacy Data Protection in Wireless Sensor Networks, in: Information Technology Journal, 2011: 833-840.

DOI: 10.3923/itj.2011.833.840

Google Scholar

[7] J. Feng and M. Potkonjak, Real-time watermarking techniques for sensor networks, in: Security and Watermarking of Multimedia Contents, Santa Clara, CA, USA: SPIE Press, 2003: 391-402.

DOI: 10.1117/12.479736

Google Scholar

[8] W. Zhang, P. De, Y. Liu, S. K. Das. Secure Data Aggregation in Wireless Sensor Networks: A Watermark Based Authentication Supportive Approach, in: Pervasive and Mobile Computing, 2008, 4(5): 658-680.

DOI: 10.1016/j.pmcj.2008.05.005

Google Scholar