SPINS: security protocols for sensor networks
Wireless Networks
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Security in sensor networks: watermarking techniques
Wireless sensor networks
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
A framework of authentication and authorization for e-health services
Proceedings of the 3rd ACM workshop on Secure web services
Datalink streaming in wireless sensor networks
Proceedings of the 4th international conference on Embedded networked sensor systems
Practical algorithm for data security (PADS) in wireless sensor networks
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Survey of RFID Authentication Protocols
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
Subjective and Objective Watermark Detection Using a Novel Approach --- Barcode Watermarking
Computational Intelligence and Security
Copyright Protection in Wireless Sensor Networks by Watermarking
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
A robust image watermarking algorithm using SVR detection
Expert Systems with Applications: An International Journal
Secure Data Transmission of Wireless Sensor Network Based on Information Hiding
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
Web of Things as a Framework for Ubiquitous Intelligence and Computing
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
Distortion-Free Watermarking Scheme for Wireless Sensor Networks
INCOS '09 Proceedings of the 2009 International Conference on Intelligent Networking and Collaborative Systems
A security architecture for wireless sensor networks based-on public key cryptography
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An authentication method for self nodes based on watermarking in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Multiple image watermarking using the SILE approach
MUSP'06 Proceedings of the 6th WSEAS international conference on Multimedia systems & signal processing
Tamper detection for ubiquitous RFID-Enabled supply chain
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Watermarking technique for wireless multimedia sensor networks: a state of the art
Proceedings of the CUBE International Information Technology Conference
Hi-index | 0.00 |
The function of Wireless Sensor Networks (WSNs) is to collect and store data sent to other nodes or servers. Current technologies allow validation during transit, but stop after the data reaches its destination. One of the challenges with these technologies is to ensure that the source of the data is preserved, once it leaves the WSN. This is important as the data can be used by other applications or distributed to other parties. Therefore, it needs to be ensured that the data source is identifiable and the data is valid. Sensors are susceptible to various types of attack, such as data modification, data insertion and deletion, or even physical capture and sensor replacement. Hence, security becomes an important issue with WSNs. The traditional algorithms are used for securing data transmission between sensor nodes. However these algorithms need millions of multiplication instructions to perform operations, and cannot efficiently protect the copyright of the valuable sensor data. Watermarking is one of the effective choices to overcome this challenge. Watermark adds a second line of defense to ensure that the data is valid, even if someone cracks the encryption. This paper proposes a watermarking technique for copyright protection of data in WSNs. It also provides performance evaluation of the technique to show its robustness against various types of attacks, like data deletion, packet replication and Sybil attacks.