Security in sensor networks: watermarking techniques

  • Authors:
  • Jennifer L. Wong;Jessica Feng;Darko Kirovski;Miodrag Potkonjak

  • Affiliations:
  • University of California, Los Angeles, Los Angeles, CA;University of California, Los Angeles, Los Angeles, CA;Microsoft Research, Redmond, WA;University of California, Los Angeles, Los Angeles, CA

  • Venue:
  • Wireless sensor networks
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

The actual deployment of the majority of envisioned applications for sensor networks is crucially dependent on resolving associated security, privacy, and digital rights management (DRM) issues. Although cryptography, security, and DRM have been active research topics for the last several decades, wireless sensor networks (WSN) pose a new system of conceptual, technical, and optimization challenges.In this Chapter we survey two areas related to security in WSN. First, we briefly survey techniques for the protection of the routing infrastructure at the network level for mobile multi-hop (ad-hoc) networks. Secondly, we discuss the first-known watermarking technique for authentication of sensor network data and information. We conclude the Chapter by providing a short discussion of future research and development directions in security and privacy in sensor networks.