IJRE – Volume 3 Issue 1 Paper 6

DATA AGGREGATION INTEGRITY IN WIRELESS SENSOR NETWORKS USING CROSS LAYER WATERMARKING

Author’s Name : C.Manjula | R.Pooja | K.Ramya | V.Saranya

Volume 03 Issue 01  Year 2016  ISSN No:  2349-252X  Page no: 22-24

12

 

 

 

Abstract:

Ensuring data aggregation integrity in heterogeneous wireless sensor networks using cross layer watermarking mechanism. The proposed security method ensures maximum security based on new fragile watermarking technique which involves a dynamic embedding mechanism and a cross layer approach. Comparing to the existing security solution, our proposed method has an efficient integrity of data for both homogeneous and heterogeneous sensor networks

Keywords:

Cross-layer watermarking, data aggregation integrity, heterogeneous wireless sensor network

References:

  1. DjallelEddineBoubiche, Sabrina Boubiche, and AzeddineBilami, “A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in HeterogeneousWireless Sensor Networ,” inproc.IEEE, vol. 19, no. 5, may20 15.
  2. X. Y. Li, Y. J. Zhong, F. B. Liao, and R. Li, “An improved watermarking scheme for secure data aggregation in wireless sensor networks,” Appl. Mech. Mater., vol. 556-562, pp. 6298-6301, 2014.
  3. S. Xingming, S.Jianwei, W. Baowei, and L. Qi, “Digital watermarking method for data integrity protection in wireless sensor networks,” Int. J. Security Appl.,vol. 7 , no. 4, pp. 407-416, Jun. 2013.
  4. E. Elbasi and S. Ozdemir, “Secure data aggregation in wireless multimedia sensor networks via watermarking,” in Proc. IEEE AICT, 2012, pp. 1-6.
  5. B. Wang, X.Sun, and H. Ren, “Multi-mark: Multiple watermarking method for privacy data protection in wireless sensor networks,” Inf. Technol. J., vol.10, no. 4, pp. 833-840, Oct. 2011.
  6. M. K. Sandhya and K. Murugan , “Secure framework for data centric heterogeneous wireless sensor networks,” in Proc. CNSA, Chennai, India, Jul. 23-25, 2010, pp. 1-10.
  7. S. Wang, Z. Cao, M. A. Strangio, and L. Wang,”Cryptanalysis and improvement of an elliptic curve Diffie-Hellman Key agreement protocol,” IEEE Commun.Lett.vol. 12, no. 2rgff, pp. 149-151, Feb. 2008.
  8. W. Zhang, Y. Liu, S. K. Das, and P. De, “Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach,” Pervasive Mobile Compute., vol. 4, no. 5, pp. 658-680, Oct. 2008.
  9. S. Ozdemir, “Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism, in Proc.ICPS, Istanbul, Turkey, 2007, pp. 165-168.
  10. C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient aggregation of encrypted data in wireless sensor networks,” in Proc. MobiQuitous 200, 2005, pp. 109-117.
  11. F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proc. IEEE, vol. 87, no.7 , pp. 1079-1107,Jul. 1999.