A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
2017
Security and Communication Networks
In this paper, a novel lightweight data integrity protection scheme based on fragile watermark is proposed to solve the contradiction between the security and restricted resource of perception layer. ...
The digital watermark is generated by one-way hash function SHA-1 before embedding to the dynamic computed position. ...
(c) Selective forwarding: a malicious node added to WSNs deletes partial packets and forwards some packets to destination selectively. ...
doi:10.1155/2017/3126010
fatcat:znongblafbdbnfdwrfr2uhfq34
Selective forwarding detection (SFD) in wireless sensor networks
2015
2015 Long Island Systems, Applications and Technology
Since the sensor nodes have limited capabilities for most of these constraints, a selective forwarding attack is difficult to detect in the networks. ...
Thus, there are different types of detection approaches against security attacks on the network layer in WSNs. ...
In this paper, we present an approach that detection selective forwarding attacks over the WSNs. The monitor sensor nodes detect selective forwarding attacks using detector. ...
doi:10.1109/lisat.2015.7160207
fatcat:fnd75briqfcfjmyy36s5xszlci
Multi-Layer Approach for the Detection of Selective Forwarding Attacks
2015
Sensors
Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. ...
In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. ...
The base station compares the extracted watermark to the original watermark to detect a selective forwarding attack. ...
doi:10.3390/s151129332
pmid:26610499
pmcid:PMC4701335
fatcat:qcourafeqfc2tdoisobslkbomy
Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking
2020
IEEE Access
In addition, the proposed scheme consumes less energy compared with similar works due to the use of lightweight watermarking and authentication techniques. ...
The homomorphic encryption used in this scheme is to provide fast and efficient and consumes less energy while identifying sensor nodes for the purpose of sinkhole detection and prevention. ...
Another reason for considering the sinkhole attack one of the most detrimental attacks on WSNs is that it can enable other attacks, such as wormable attacks and selective forwarding attacks [12] . ...
doi:10.1109/access.2020.2994587
fatcat:zmfz5ou6ybgnlg2ik2lm57delq
A Packet Loss Tolerated Method for Data Integrity Protection in Wireless Sensor Networks
2016
International Journal of Multimedia and Ubiquitous Engineering
Most of methods treat packet loss as anomaly attacks, hardly being used in real network. ...
Sensory data collected by nodes generate digital watermarking for integrity detection. Watermarking will be stored in sensory data. ...
The deletion attack and detecting selective forwarding attacks experiment [14] of this paper is shown as follows: The sink calculate packet loss rate by periodic examination and issues deletion attack ...
doi:10.14257/ijmue.2016.11.7.01
fatcat:orygharxk5gxtnejnn75qfk4lm
Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
2021
Electronics
Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes. ...
Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT). ...
In [112] , the researchers merge the MAC layer parameters within a watermark technique in order to improve the attack detection in the WSN. ...
doi:10.3390/electronics10141744
fatcat:fcyxojd22fe2jfp3acafsqq2wy
A Review of Selective Forwarding Attacks in Wireless Sensor Networks
2012
International Journal of Advanced Smart Sensor Network Systems
attacks In selective forwarding attacks, malicious nodes behave like normal nodes and selectively drop packets. ...
There are number of attacks on wireless sensor networks like black hole attack, sink hole attack ,Sybil attack ,selective forwarding attacks etc. in this paper we will concentrate on selective forwarding ...
Deng-yin ZHANG et.al [17] et.al proposed a method to detect selective forwarding attacks based on digital watermarking technology. ...
doi:10.5121/ijassn.2012.2304
fatcat:tg55w6cgbbdspidbmgn4zlq42m
Security Mechanisms for Selective Forwarding Attack in Wireless Sensor Networks: Review and Analysis
2014
IOSR Journal of Computer Engineering
Among the number of attacks on the sensor network, the Selective Forwarding attack, alias Grayhole attack, is a serious and hard-to-detect security attack that can render the network useless if left undetected ...
This paper intent to give an overview and analysis of existing approaches to counter selective forwarding attack in wireless sensor networks. ...
[11] (2011)
Detecting Selective Forwarding Attacks in WSNs using Watermark
A Provenance based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks
None The method detects ...
doi:10.9790/0661-16460713
fatcat:f3kundqkarf7xit5izyw5qy2di
A Reversible Watermarking Scheme Based on Difference Expansion for Wireless Sensor Networks
2015
International Journal of Grid and Distributed Computing
Sensors are typically operated in uncontrolled and possibly hostile environment. Watermark technology has been used for integrity and copyright protection. ...
In this paper, we propose a novel reversible watermarking authentication scheme RDE for WSNs, which is based on the difference expansion of a generalized integer transform. ...
According to the experimental results our method achieved 100% detection on packet forgery attack, selective forwarding, packet replay and packet tampering. ...
doi:10.14257/ijgdc.2015.8.2.14
fatcat:gz6xfabd6jae3otgkto53fk6yq
Watermark Authentication for Secure Data Aggregation in WSN Based on Secure Hash Algorithm and Node Identifier
2019
Zenodo
In watermarking, each sensor node embeds a unique watermark to sensor data and BS can verify the data integrity. Node Authentication is one of the important topics in WSNs. ...
Data integrity and authentication are an important security challenge in Wireless Sensor Networks (WSN). The main required in WSNs is to check the integrity of the received data at BS. ...
Two nodes were used to perform three attacks respectively: Packets Forgery, Selective Forwarding, Packets Tampering. ...
doi:10.5281/zenodo.3526525
fatcat:tviqg7j2gvbg5k5izq7zl655ey
A Review on Gray Hole Attack in Wireless Sensor Network
2015
International Journal of Computer Applications
In the proposed solutions, I have tried to give better solutions in the sense of detection and prevention of Gray Hole Attack or Selective Forwarding attack. ...
As per my knowledge, I have described drawbacks of Gray Hole Attack, or Selective Forwarding Attack, thus providing better way to understand the Gray Hole Attack in better way and the proposed solution ...
Sunil Patel for discussions in specific domain. ...
doi:10.5120/21675-4763
fatcat:u5s5bg5kqzc4lfkmzjndikgcs4
A Lightweight Data Integrity Scheme for Sensor Networks
2011
Sensors
This paper proposes a new fragile watermarking technique to detect unauthorized alterations in WSN data streams. ...
The watermark, which is computed using a hash function, is stored in the previous group in a linked-list fashion to ensure data freshness and mitigate replay attacks, FWC-D generates a serial number SN ...
For example, WSNs are used in military applications for monitoring friendly forces, battlefield surveillance, biological attack detection, troop coordination, and battle damage assessments. ...
doi:10.3390/s110404118
pmid:22163840
pmcid:PMC3231299
fatcat:4la3nn7wvfaxvbg2lxmfzsrfbm
A SOLUTION TO SELECTIVE FORWARD ATTACK IN WIRELESS SENSOR NETWORK
2018
International Journal of Students Research in Technology & Management
There is some attacks on wireless sensor networks like black hole attack, sinkhole attack, Sybil attack, selective forwarding, etc. In this paper, we will concentrate on selective forwarding attack. ...
Selective Forwarding Attack is one of the many security threats in wireless sensor networks which can degrade network performance. An adversary on the transmission path selectively drops the packet. ...
safely, and detect the selective forwarding attack judge the trust value of each node to select a secure path for message forwarding and then use the watermark technology to detect the malicious nodes ...
doi:10.18510/ijsrtm.2018.625
fatcat:s5lcf6jwtrgl5fngtxtevt2smm
Reversible Multiple Items Authentication Scheme for WSNs
2020
IEEE Access
In the carrier group, first, to decrease the visual perception introduced by information embedding, the beginning parameter T m and the end parameter T p are used to select the fluctuation region of the ...
In this paper, a reversible authentication scheme for wireless sensor networks (WSNs) is proposed aimed at multiple items authentication and good imperception of transmitted data. ...
Each category of tampering attack used 50 random samples, and Table 2 shows the detection failure rate and detection success rate for three categories of tampering attacks with the adopted WSNs data ...
doi:10.1109/access.2020.3036383
fatcat:3igk2wurefd4hg7zsumefn3uwi
A Survey of Image Security in Wireless Sensor Networks
2015
Journal of Imaging
In this paper, we survey recent developments in encryption and privacy in wireless sensor networks deployed for transmissions of image snapshots, reviewing innovative approaches to provide different levels ...
In recent years, a great deal of monitoring, control and tracking applications have been designed for different scenarios. ...
Efficient mechanisms against DoS attacks in WSN should be adopted. In this context, an intrusion detection mechanism could be employed [24] . ...
doi:10.3390/jimaging1010004
fatcat:bpjvbfew7fco5kt5diberowvde
« Previous
Showing results 1 — 15 out of 178 results