SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
An Application-Level Data Transparent Authentication Scheme without Communication Overhead
IEEE Transactions on Computers
Reversible data hiding based on block median preservation
Information Sciences: an International Journal
Efficient reversible data hiding for color filter array images
Information Sciences: an International Journal
Expansion Embedding Techniques for Reversible Watermarking
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
IEEE Transactions on Circuits and Systems for Video Technology
Reversible watermarking scheme for medical image based on differential evolution
Expert Systems with Applications: An International Journal
Hi-index | 0.07 |
Authentication is a very important demand in wireless sensor networks (WSNs), especially in some critical applications. Previous watermarking-based approaches always make irreversible modifications in the watermarked data. In this paper, we propose a novel reversible watermarking authentication scheme for WSNs, which is based on prediction-error expansion. The sensor node groups the stream data, and two adjacent data groups compose the non-overlapping authentication group. The watermark bits are computed from the first data group and embedded into the second one before transmission. The sink does the verification and complete restoration. Compared with the previous work, our approach only buffers copy of current data element instead of the entire data group, which greatly reduces the delay. Analysis and experimental results show that our scheme losslessly authenticates the sensory stream data with low cost.