2008
DOI: 10.1016/j.pmcj.2008.05.005
|View full text |Cite
|
Sign up to set email alerts
|

Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
62
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 88 publications
(62 citation statements)
references
References 18 publications
0
62
0
Order By: Relevance
“…In this way it can check whether data has been changed by compromised node or not. [18] By visualizing the sensed data watermarking is performed, data which has been gathered from the whole network is converted into images, taking snapshots at particular time where node's reading is visualized as pixel's intensity and node as pixel. Direct spread spectrum watermarking is used for balancing energy consumption.…”
Section: Digital Watermarking Based On Dsssmentioning
confidence: 99%
“…In this way it can check whether data has been changed by compromised node or not. [18] By visualizing the sensed data watermarking is performed, data which has been gathered from the whole network is converted into images, taking snapshots at particular time where node's reading is visualized as pixel's intensity and node as pixel. Direct spread spectrum watermarking is used for balancing energy consumption.…”
Section: Digital Watermarking Based On Dsssmentioning
confidence: 99%
“…The blank character method embedded spaces selectively according to the corresponding data bit of watermark information is 1 or 0, which increases the length of the data packet and the data cannot be accurately regained. Although the way of the former modifying the least significant bit [12][13][14][15][16] has no effect on the amount of data transmitted, the accuracy of the data has been damaged. RDE scheme not only has no additional transmission overhead but also regains the original data reversibly.…”
Section: Invisibility and Accuracymentioning
confidence: 99%
“…So the digital watermarking technology is introduced. Watermarking has been popularly used in security scheme in WSNs [1][2][3][4][5][6], mainly based on changing the least significant bit or embedding some blank space, which increases the length of the data packet or destructs the accuracy of the original data to some extent. Such changes often do not affect the visual perception and information expression of images or any other multimedia data with high redundancy.…”
Section: Introductionmentioning
confidence: 99%
“…We use theaverage error as a performance measurement to estimate the error resulting from thedifferences in data before and after transmission. The accuracy of the measurementperformance is not perfect, but it provides a good guideline for making a decision.In order to compare two data compression techniques, we studied JPEGcompression and a watermark-based approach by Wei Zhang [8]. Studying each system and understanding the equations for each technique, as well asapplying some examples will help users to choose the best technique for their specificapplication and type of WSN.…”
Section: Data Compressionmentioning
confidence: 99%
“…The many studies and papers regarding secure data aggregation have ledto a number of options for securing data with some tradeoffs; these should be consideredcarefully, depending on the application. To examine the subject of security more closely,we need to study the work of Zhang et al [8], which uses digital watermarking as anauthentication method for transmitted data and includes both aggregation andcompression.Typically, security and data aggregation involves: (i) decrypting the data when it is received by the aggregators, (ii) aggregating the data according to the aggregating function, and (iii) encrypting the data before sending it forward to the next node.…”
Section: Secure Data Aggregationmentioning
confidence: 99%