Security in Sensor Networks: Watermarking Techniques [chapter]

Jennifer L. Wong, Jessica Feng, Darko Kirovski, Miodrag Potkonjak
Wireless Sensor Networks  
The actual deployment of the majority of envisioned applications for sensor networks is crucially dependent on resolving associated security, privacy, and digital rights management (DRM) issues. Although cryptography, security, and DRM have been active research topics for the last several decades, wireless sensor networks (WSN) pose a new system of conceptual, technical, and optimization challenges. In this Chapter we survey two areas related to security in WSN. First, we briefly survey
more » ... es for the protection of the routing infrastructure at the network level for mobile multi-hop (ad-hoc) networks. Secondly, we discuss WIRELESS SENSOR NETWORKS the first-known watermarking technique for authentication of sensor network data and information. We conclude the Chapter by providing a short discussion of future research and development directions in security and privacy in sensor networks.
doi:10.1007/978-1-4020-7884-2_14 fatcat:pz5klcwmlbgu5jbnftj3ihc7ju