Title :
Watermarking sensor data for protecting the integrity
Author :
Juma, Hussam ; Kamel, Ibrahim ; Kaya, Lami
Author_Institution :
Dept. of Comput. Sci., Univ. of Sharjah, Sharjah
Abstract :
Wireless sensors typically operate in uncontrolled and possibly hostile environment. Thus, sensors have a high risk of being captured and compromised by an adversary. Traditional security schemes are computationally expensive, because they introduce overhead which shortens the life of the sensors. Watermarking schemes are usually light weight and do not require extensive computing and power resources in comparison with traditional security techniques. Thus they can be attractive alternative for wireless sensor applications. This paper proposes two fragile watermarking schemes S-SGW and FWC to provide integrity for sensor data. The proposed scheme S-SGW is a simplification of a technique proposed by Guo et.al. for data streams. S-SGW and FWC requires less computing power than the original technique and thus; more suitable for WSNs. Yet it provides the same sensitivity to malicious updates. Data elements generated by sensors are organized into groups with variable sizes. In S-SGW a secret watermark is generated from every two consecutive groups. The watermark is then embedded in the earlier group by replacing the least significant bits in the data element. The performance evaluations show that watermark composition as well as the embedding and the extraction algorithms of the S-SGW and FWC are much faster than that of Guo et.al.
Keywords :
data integrity; security of data; telecommunication security; watermarking; wireless sensor networks; FWC watermarking scheme; S-SGW watermarking scheme; data element; data integrity protection; data streams; fragile watermarking scheme; hostile environment; malicious update; secret watermark; security; sensor data watermarking; sliding group watermark; uncontrolled environment; watermark composition; watermark embedding; watermark extraction; wireless sensor application; wireless sensor network; Batteries; Communication system security; Computer science; Cryptography; Data security; Protection; Sensor arrays; Sensor phenomena and characterization; Watermarking; Wireless sensor networks;
Conference_Titel :
Innovations in Information Technology, 2008. IIT 2008. International Conference on
Conference_Location :
Al Ain
Print_ISBN :
978-1-4244-3396-4
Electronic_ISBN :
978-1-4244-3397-1
DOI :
10.1109/INNOVATIONS.2008.4781662