期刊
IEEE INTERNET OF THINGS JOURNAL
卷 10, 期 9, 页码 8245-8256出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3230754
关键词
Watermarking; Wireless sensor networks; Authentication; Encryption; Data integrity; Security; Energy consumption; Double watermark authentication; flag-check matrix; lossless recovery; wireless sensor networks (WSNs)
This article proposes a data authentication scheme based on a double watermark for data security in wireless sensor networks (WSNs). The double watermark consists of a reversible watermark and an irreversible watermark. The scheme embeds the reversible watermark into the effective precision bit of data generated by group head data, and embeds the irreversible watermark into the flag bit using a defined array and the effective precision bit. The comprehensive performance of the proposed scheme outperforms that of existing schemes, as demonstrated by security analysis and experimental results.
Aiming at data security in wireless sensor networks (WSNs), a data authentication scheme based on a double watermark is proposed in this article. Double watermark includes reversible watermark and irreversible watermark. The former generated by group head data is embedded into the effective precision bit of data, and the latter generated by the effective precision bit of the data themselves and a defined array is embedded into the flag bit in two cases. Two adjacent groups form a working group. For the first case, a flag-check matrix is constructed by the special data set which includes the head of the current group and the tail of the previous group, and the data around them. Through the matrix, the watermark is embedded into the special data set to ensure the robustness of grouping. For the second case, watermark is embedded into the group data except special data set (the rest data) to ensure efficient detection of attacks. When the attacked position and type are detected, the data that are not tampered with in this group can still recover the effective precision bit. The security analysis and experimental results demonstrate that the comprehensive performance of the proposed scheme outperforms that of those state-of-the-art schemes.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据