178 Hits in 4.0 sec

A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

Guoyin Zhang, Liang Kou, Liguo Zhang, Chao Liu, Qingan Da, Jianguo Sun
2017 Security and Communication Networks  
In this paper, a novel lightweight data integrity protection scheme based on fragile watermark is proposed to solve the contradiction between the security and restricted resource of perception layer.  ...  The digital watermark is generated by one-way hash function SHA-1 before embedding to the dynamic computed position.  ...  (c) Selective forwarding: a malicious node added to WSNs deletes partial packets and forwards some packets to destination selectively.  ... 
doi:10.1155/2017/3126010 fatcat:znongblafbdbnfdwrfr2uhfq34

Selective forwarding detection (SFD) in wireless sensor networks

Naser M. Alajmi, Khaled M. Elleithy
2015 2015 Long Island Systems, Applications and Technology  
Since the sensor nodes have limited capabilities for most of these constraints, a selective forwarding attack is difficult to detect in the networks.  ...  Thus, there are different types of detection approaches against security attacks on the network layer in WSNs.  ...  In this paper, we present an approach that detection selective forwarding attacks over the WSNs. The monitor sensor nodes detect selective forwarding attacks using detector.  ... 
doi:10.1109/lisat.2015.7160207 fatcat:fnd75briqfcfjmyy36s5xszlci

Multi-Layer Approach for the Detection of Selective Forwarding Attacks

Naser Alajmi, Khaled Elleithy
2015 Sensors  
Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks.  ...  In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection.  ...  The base station compares the extracted watermark to the original watermark to detect a selective forwarding attack.  ... 
doi:10.3390/s151129332 pmid:26610499 pmcid:PMC4701335 fatcat:qcourafeqfc2tdoisobslkbomy

Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking

Huda A. Babaeer, Saad A. AL-ahmadi
2020 IEEE Access  
In addition, the proposed scheme consumes less energy compared with similar works due to the use of lightweight watermarking and authentication techniques.  ...  The homomorphic encryption used in this scheme is to provide fast and efficient and consumes less energy while identifying sensor nodes for the purpose of sinkhole detection and prevention.  ...  Another reason for considering the sinkhole attack one of the most detrimental attacks on WSNs is that it can enable other attacks, such as wormable attacks and selective forwarding attacks [12] .  ... 
doi:10.1109/access.2020.2994587 fatcat:zmfz5ou6ybgnlg2ik2lm57delq

A Packet Loss Tolerated Method for Data Integrity Protection in Wireless Sensor Networks

Baowei Wang, Jingzhou Yan, Tao Li, Xingming Sun, Li Ma
2016 International Journal of Multimedia and Ubiquitous Engineering  
Most of methods treat packet loss as anomaly attacks, hardly being used in real network.  ...  Sensory data collected by nodes generate digital watermarking for integrity detection. Watermarking will be stored in sensory data.  ...  The deletion attack and detecting selective forwarding attacks experiment [14] of this paper is shown as follows: The sink calculate packet loss rate by periodic examination and issues deletion attack  ... 
doi:10.14257/ijmue.2016.11.7.01 fatcat:orygharxk5gxtnejnn75qfk4lm

Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview

Raniyah Wazirali, Rami Ahmad, Ahmed Al-Amayreh, Mohammad Al-Madi, Ala' Khalifeh
2021 Electronics  
Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes.  ...  Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT).  ...  In [112] , the researchers merge the MAC layer parameters within a watermark technique in order to improve the attack detection in the WSN.  ... 
doi:10.3390/electronics10141744 fatcat:fcyxojd22fe2jfp3acafsqq2wy

A Review of Selective Forwarding Attacks in Wireless Sensor Networks

Preeti Sharma
2012 International Journal of Advanced Smart Sensor Network Systems  
attacks In selective forwarding attacks, malicious nodes behave like normal nodes and selectively drop packets.  ...  There are number of attacks on wireless sensor networks like black hole attack, sink hole attack ,Sybil attack ,selective forwarding attacks etc. in this paper we will concentrate on selective forwarding  ...  Deng-yin ZHANG [17] proposed a method to detect selective forwarding attacks based on digital watermarking technology.  ... 
doi:10.5121/ijassn.2012.2304 fatcat:tg55w6cgbbdspidbmgn4zlq42m

Security Mechanisms for Selective Forwarding Attack in Wireless Sensor Networks: Review and Analysis

Bhargavi Singh
2014 IOSR Journal of Computer Engineering  
Among the number of attacks on the sensor network, the Selective Forwarding attack, alias Grayhole attack, is a serious and hard-to-detect security attack that can render the network useless if left undetected  ...  This paper intent to give an overview and analysis of existing approaches to counter selective forwarding attack in wireless sensor networks.  ...  [11] (2011) Detecting Selective Forwarding Attacks in WSNs using Watermark A Provenance based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks None The method detects  ... 
doi:10.9790/0661-16460713 fatcat:f3kundqkarf7xit5izyw5qy2di

A Reversible Watermarking Scheme Based on Difference Expansion for Wireless Sensor Networks

Qun Ding, Baowei Wang, Xingming Sun, Jinwei Wang, Jian Shen
2015 International Journal of Grid and Distributed Computing  
Sensors are typically operated in uncontrolled and possibly hostile environment. Watermark technology has been used for integrity and copyright protection.  ...  In this paper, we propose a novel reversible watermarking authentication scheme RDE for WSNs, which is based on the difference expansion of a generalized integer transform.  ...  According to the experimental results our method achieved 100% detection on packet forgery attack, selective forwarding, packet replay and packet tampering.  ... 
doi:10.14257/ijgdc.2015.8.2.14 fatcat:gz6xfabd6jae3otgkto53fk6yq

Watermark Authentication for Secure Data Aggregation in WSN Based on Secure Hash Algorithm and Node Identifier

Dr. Jamal Mohammed Kadhim, Enas Faris Yahya
2019 Zenodo  
In watermarking, each sensor node embeds a unique watermark to sensor data and BS can verify the data integrity. Node Authentication is one of the important topics in WSNs.  ...  Data integrity and authentication are an important security challenge in Wireless Sensor Networks (WSN). The main required in WSNs is to check the integrity of the received data at BS.  ...  Two nodes were used to perform three attacks respectively: Packets Forgery, Selective Forwarding, Packets Tampering.  ... 
doi:10.5281/zenodo.3526525 fatcat:tviqg7j2gvbg5k5izq7zl655ey

A Review on Gray Hole Attack in Wireless Sensor Network

Dharmendra Mishra, Deepak Sukheja, Sunil Patel
2015 International Journal of Computer Applications  
In the proposed solutions, I have tried to give better solutions in the sense of detection and prevention of Gray Hole Attack or Selective Forwarding attack.  ...  As per my knowledge, I have described drawbacks of Gray Hole Attack, or Selective Forwarding Attack, thus providing better way to understand the Gray Hole Attack in better way and the proposed solution  ...  Sunil Patel for discussions in specific domain.  ... 
doi:10.5120/21675-4763 fatcat:u5s5bg5kqzc4lfkmzjndikgcs4

A Lightweight Data Integrity Scheme for Sensor Networks

Ibrahim Kamel, Hussam Juma
2011 Sensors  
This paper proposes a new fragile watermarking technique to detect unauthorized alterations in WSN data streams.  ...  The watermark, which is computed using a hash function, is stored in the previous group in a linked-list fashion to ensure data freshness and mitigate replay attacks, FWC-D generates a serial number SN  ...  For example, WSNs are used in military applications for monitoring friendly forces, battlefield surveillance, biological attack detection, troop coordination, and battle damage assessments.  ... 
doi:10.3390/s110404118 pmid:22163840 pmcid:PMC3231299 fatcat:4la3nn7wvfaxvbg2lxmfzsrfbm


Gulbir Singh, Om Prakash Dubey
2018 International Journal of Students Research in Technology & Management  
There is some attacks on wireless sensor networks like black hole attack, sinkhole attack, Sybil attack, selective forwarding, etc. In this paper, we will concentrate on selective forwarding attack.  ...  Selective Forwarding Attack is one of the many security threats in wireless sensor networks which can degrade network performance. An adversary on the transmission path selectively drops the packet.  ...  safely, and detect the selective forwarding attack judge the trust value of each node to select a secure path for message forwarding and then use the watermark technology to detect the malicious nodes  ... 
doi:10.18510/ijsrtm.2018.625 fatcat:s5lcf6jwtrgl5fngtxtevt2smm

Reversible Multiple Items Authentication Scheme for WSNs

Guangyong Gao, Bin Wu, Yuxiang Wang, Zhiqiang Zhao, Liya Xu, Chao Yin
2020 IEEE Access  
In the carrier group, first, to decrease the visual perception introduced by information embedding, the beginning parameter T m and the end parameter T p are used to select the fluctuation region of the  ...  In this paper, a reversible authentication scheme for wireless sensor networks (WSNs) is proposed aimed at multiple items authentication and good imperception of transmitted data.  ...  Each category of tampering attack used 50 random samples, and Table 2 shows the detection failure rate and detection success rate for three categories of tampering attacks with the adopted WSNs data  ... 
doi:10.1109/access.2020.3036383 fatcat:3igk2wurefd4hg7zsumefn3uwi

A Survey of Image Security in Wireless Sensor Networks

Danilo Gonçalves, Daniel Costa
2015 Journal of Imaging  
In this paper, we survey recent developments in encryption and privacy in wireless sensor networks deployed for transmissions of image snapshots, reviewing innovative approaches to provide different levels  ...  In recent years, a great deal of monitoring, control and tracking applications have been designed for different scenarios.  ...  Efficient mechanisms against DoS attacks in WSN should be adopted. In this context, an intrusion detection mechanism could be employed [24] .  ... 
doi:10.3390/jimaging1010004 fatcat:bpjvbfew7fco5kt5diberowvde
« Previous Showing results 1 — 15 out of 178 results