4.8 Article

A Data Integrity Authentication Scheme in WSNs Based on Double Watermark

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 10, 期 9, 页码 8245-8256

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3230754

关键词

Watermarking; Wireless sensor networks; Authentication; Encryption; Data integrity; Security; Energy consumption; Double watermark authentication; flag-check matrix; lossless recovery; wireless sensor networks (WSNs)

向作者/读者索取更多资源

This article proposes a data authentication scheme based on a double watermark for data security in wireless sensor networks (WSNs). The double watermark consists of a reversible watermark and an irreversible watermark. The scheme embeds the reversible watermark into the effective precision bit of data generated by group head data, and embeds the irreversible watermark into the flag bit using a defined array and the effective precision bit. The comprehensive performance of the proposed scheme outperforms that of existing schemes, as demonstrated by security analysis and experimental results.
Aiming at data security in wireless sensor networks (WSNs), a data authentication scheme based on a double watermark is proposed in this article. Double watermark includes reversible watermark and irreversible watermark. The former generated by group head data is embedded into the effective precision bit of data, and the latter generated by the effective precision bit of the data themselves and a defined array is embedded into the flag bit in two cases. Two adjacent groups form a working group. For the first case, a flag-check matrix is constructed by the special data set which includes the head of the current group and the tail of the previous group, and the data around them. Through the matrix, the watermark is embedded into the special data set to ensure the robustness of grouping. For the second case, watermark is embedded into the group data except special data set (the rest data) to ensure efficient detection of attacks. When the attacked position and type are detected, the data that are not tampered with in this group can still recover the effective precision bit. The security analysis and experimental results demonstrate that the comprehensive performance of the proposed scheme outperforms that of those state-of-the-art schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据