2015
DOI: 10.1007/s11235-015-0047-0
|View full text |Cite
|
Sign up to set email alerts
|

SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs

Abstract: Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption ke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 27 publications
(28 reference statements)
0
12
0
Order By: Relevance
“…The extraction and verification process are described as follows: , = rand( , , ); (4) for = 1 to do (5) i n d e xfl ; (6) fl Packet index ; (7) for = 1 to do (8) i n d e xfl ; (9) P a c k e t = Packet index ; (10) for = 1 to do (11) Da tafl Data ‖ Packet ⋅ data ; (12) Data fl Data ‖ ; (13) Data fl Data ‖ ; (14) 0 fl Hash(Data); (15) fl MSB( 0 , ); (16) if == then (17) Return (Integrity intact); (18) else (19) Return (Integrity tampered); …”
Section: Watermark Extraction Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…The extraction and verification process are described as follows: , = rand( , , ); (4) for = 1 to do (5) i n d e xfl ; (6) fl Packet index ; (7) for = 1 to do (8) i n d e xfl ; (9) P a c k e t = Packet index ; (10) for = 1 to do (11) Da tafl Data ‖ Packet ⋅ data ; (12) Data fl Data ‖ ; (13) Data fl Data ‖ ; (14) 0 fl Hash(Data); (15) fl MSB( 0 , ); (16) if == then (17) Return (Integrity intact); (18) else (19) Return (Integrity tampered); …”
Section: Watermark Extraction Algorithmmentioning
confidence: 99%
“…Therefore the watermark generation of PRW saves more time than previous watermarking schemes. Although [9] also uses SHA-1, it embeds 160 bits of data into the packet that greatly increase the transmission load. It not only consumes more energy, but also increases the transmission delay.…”
Section: Average Delaymentioning
confidence: 99%
See 1 more Smart Citation
“…where A is the average power received at a reference distance d 0 ; X r is a Gaussian random variable with zero mean and standard deviation r in dB. Typical values for the path loss exponent are in the range of 1.5 through 5 and for r in the ranges of values from 4 to 12 dB [3,12,13]. Multilateration is used in order to estimate the position of the NOI.…”
Section: Problem Statementmentioning
confidence: 99%
“…The adoption of the Wireless Sensor Network (WSN) has been prominently increasing owing to its cost effective remote monitoring capabilities [1], [2]. The sensors follow various clustering schemes in order to carry out data aggregation process [3], [4]. In such communication scheme, usually the members nodes forward the physically sensed data to their assigned cluster head which is then forwarded to either sink (using single hop) or to different cluster head (using multihop).…”
Section: Introductionmentioning
confidence: 99%