2018
DOI: 10.3390/s18124346
|View full text |Cite
|
Sign up to set email alerts
|

A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications

Abstract: Using Internet of Things (IoT) applications has been a growing trend in the last few years. They have been deployed in several areas of life, including secure and sensitive sectors, such as the military and health. In these sectors, sensory data is the main factor in any decision-making process. This introduces the need to ensure the integrity of data. Secure techniques are needed to detect any data injection attempt before catastrophic effects happen. Sensors have limited computational and power resources. Th… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 36 publications
0
14
0
Order By: Relevance
“…To prevent an attacker node from modifying its key, the BS uses a homomorphic private-key encryption scheme using the network key (K n ) generated in the BS. Compared to other encryption algorithms, which are usually expensive and complex to compute, Homomorphic encryption is a very lightweight encryption algorithm that can be used in WSN without reducing network life time [31]. In addition, homomorphic encryption allows the IDs to be aggregated easily into the data while preserving the data property [32].…”
Section: A Initialisation Phasementioning
confidence: 99%
“…To prevent an attacker node from modifying its key, the BS uses a homomorphic private-key encryption scheme using the network key (K n ) generated in the BS. Compared to other encryption algorithms, which are usually expensive and complex to compute, Homomorphic encryption is a very lightweight encryption algorithm that can be used in WSN without reducing network life time [31]. In addition, homomorphic encryption allows the IDs to be aggregated easily into the data while preserving the data property [32].…”
Section: A Initialisation Phasementioning
confidence: 99%
“…1525 eliminate malicious data. Homomorphic encryption technique is used to reduce the packet size so that good security can be achieved using less power [16]. a) Tag Cloning In IoT each RFID tag being generated is uniquely identifiable and these tags are visible and readable by everyone.…”
Section: Malicious Datamentioning
confidence: 99%
“…Watermark bits are randomly placed (using the random generator) in the data header and then extracted and compared to find the integrity. In [ 24 ], Alromih et al proposed a Randomized watermarking filtering scheme (RWFS) for IoT applications. The watermark is randomly embedded into the encrypted data using a pseudo-random generator.…”
Section: Related Workmentioning
confidence: 99%