2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) 2015
DOI: 10.1109/wowmom.2015.7158149
|View full text |Cite
|
Sign up to set email alerts
|

In the shadows we trust: A secure aggregation tolerant watermark for data streams

Abstract: In many applications such as sensor networks, ehealthcare and environmental monitoring, data is continuously streamed and combined from multiple resources in order to make decisions based on the aggregated data streams. One major concern in these applications is assuring high trustworthiness of the aggregated data stream for correct decision-making. For example, an adversary may compromise a few data-sources and introduce false data into the aggregated data-stream and cause catastrophic consequences. In this w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 17 publications
(31 reference statements)
0
5
0
Order By: Relevance
“…Already watermarked data, presented as pseudo-images, that traverse through an additional watermarking/aggregation node are exclusively forwarded to safeguard the fragile watermark. Alternatively, an aggregation tolerant watermark can be considered [74]. To reach the critical amount of data necessary to create a pseudo-image, either forwarded data of other nodes or, in the case of insufficient forwarded data, the node's own data are collected and aggregated.…”
Section: Applicationmentioning
confidence: 99%
“…Already watermarked data, presented as pseudo-images, that traverse through an additional watermarking/aggregation node are exclusively forwarded to safeguard the fragile watermark. Alternatively, an aggregation tolerant watermark can be considered [74]. To reach the critical amount of data necessary to create a pseudo-image, either forwarded data of other nodes or, in the case of insufficient forwarded data, the node's own data are collected and aggregated.…”
Section: Applicationmentioning
confidence: 99%
“…There have appeared a number of papers devoted to the hiding of information in the data of wireless sensor networks, which is the most urgent for the mining sector. As an example, we will note the papers [ 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 ]. Within the limits of the present research, similar methods can be used for the authentication of mining service machine data.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…In particular, the Spread Spectrum watermarking technique has important features such resilience against various transformations and simple embedding operations that make it suitable for aggregation supportive environments such as sensor networks [79]. The first attempt to construct the SS watermarks for secure data aggregation is raised by Zhang et al [83].…”
Section: A Sensor Network 1) Secure In-network Data Aggregationmentioning
confidence: 99%
“…Recently, Soltani Panah et al [79] proposed a composite watermark-based solution in which several (near) orthogonal patterns are embedded into several data streams.…”
Section: A Sensor Network 1) Secure In-network Data Aggregationmentioning
confidence: 99%