2016 19th International Conference on Network-Based Information Systems (NBiS) 2016
DOI: 10.1109/nbis.2016.35
|View full text |Cite
|
Sign up to set email alerts
|

A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…Data integrity and origin integrity are the categorization of integrity. Data integrity (Hameed et al 2016) ensures that a group of attackers (Sujesh and Joe Prathap 2018a, b) or an attacker cannot add or remove sensor node as of the provenance produced as a result of malicious node devoid of discovered through the base station. Source reliability ensures with the intention of an information packets could not reprocess a provenance from other packets as its own provenance without being noticed by the base station.…”
Section: Introductionmentioning
confidence: 99%
“…Data integrity and origin integrity are the categorization of integrity. Data integrity (Hameed et al 2016) ensures that a group of attackers (Sujesh and Joe Prathap 2018a, b) or an attacker cannot add or remove sensor node as of the provenance produced as a result of malicious node devoid of discovered through the base station. Source reliability ensures with the intention of an information packets could not reprocess a provenance from other packets as its own provenance without being noticed by the base station.…”
Section: Introductionmentioning
confidence: 99%
“…The traditional approach towards security provisioning in WSN considers three basic requirements 1) confidentiality: Which is achieved by means of cryptography at physical layer to encrypt node data transmission in order to protect the confidentiality [17], 2) Integrity: the automatic message code update influences the integrity of the data [18], 3) Availability: The uptime of the WSN depends upon the remaining energy which can be influenced by engaging the network by means of false crowd or flood kind of effects [19]. Apart from these traditional considerations, WSN needs to consider many another critical requirement which is sensitive to the data exchange mechanism when integrated into the complex systems like pervasive, ubiquitous, and IoTs [20].…”
Section: Security Requirements In Wsnmentioning
confidence: 99%
“…Apart from the usual operations that any sensor node has, such as, sensing, processing, and routing, security can be termed as a top-up for enhanced features. 5,6 This research mainly focuses on the use of WSNs in such hazardous areas, such as battlefield, fire zone, and so on, where security and energy efficiency are the issues of major concern. In a battlefield, various types of sensor nodes can be deployed like soldier trackers and acoustic sensors to monitor the approach of enemy while securing the parameters.…”
Section: Introductionmentioning
confidence: 99%
“…Apart from the usual operations that any sensor node has, such as, sensing, processing, and routing, security can be termed as a top-up for enhanced features. 5,6…”
Section: Introductionmentioning
confidence: 99%