4.8 Article

A Data Integrity Authentication Scheme in WSNs Based on Double Watermark

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 10, Issue 9, Pages 8245-8256

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3230754

Keywords

Watermarking; Wireless sensor networks; Authentication; Encryption; Data integrity; Security; Energy consumption; Double watermark authentication; flag-check matrix; lossless recovery; wireless sensor networks (WSNs)

Ask authors/readers for more resources

This article proposes a data authentication scheme based on a double watermark for data security in wireless sensor networks (WSNs). The double watermark consists of a reversible watermark and an irreversible watermark. The scheme embeds the reversible watermark into the effective precision bit of data generated by group head data, and embeds the irreversible watermark into the flag bit using a defined array and the effective precision bit. The comprehensive performance of the proposed scheme outperforms that of existing schemes, as demonstrated by security analysis and experimental results.
Aiming at data security in wireless sensor networks (WSNs), a data authentication scheme based on a double watermark is proposed in this article. Double watermark includes reversible watermark and irreversible watermark. The former generated by group head data is embedded into the effective precision bit of data, and the latter generated by the effective precision bit of the data themselves and a defined array is embedded into the flag bit in two cases. Two adjacent groups form a working group. For the first case, a flag-check matrix is constructed by the special data set which includes the head of the current group and the tail of the previous group, and the data around them. Through the matrix, the watermark is embedded into the special data set to ensure the robustness of grouping. For the second case, watermark is embedded into the group data except special data set (the rest data) to ensure efficient detection of attacks. When the attacked position and type are detected, the data that are not tampered with in this group can still recover the effective precision bit. The security analysis and experimental results demonstrate that the comprehensive performance of the proposed scheme outperforms that of those state-of-the-art schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available