Recent Advances in Computer Science and Communications

Author(s): Sanjay Kumar*, Binod K. Singh, Akshita, Sonika Pundir, Rashi Joshi and Simran Batra

DOI: 10.2174/2666255813999200730230731

Role of Digital Watermarking in Wireless Sensor Network

Page: [215 - 228] Pages: 14

  • * (Excluding Mailing and Handling)

Abstract

WSN has been exhilarated in many application areas such as military, medical, environment, etc. Due to the rapid increase in applications, it causes proportionality to security threats because of its wireless communication. Since nodes used are supposed to be independent of human reach and dependent on their limited resources, the major challenges can be framed as energy consumption and resource reliability. Ensuring security, integrity, and confidentiality of the transmitted data is a major concern for WSN. Due to the limitation of resources in the sensor nodes, the traditionally intensive security mechanism is not feasible for WSNs. This limitation brought the concept of digital watermarking in existence. Watermarking is an effective way to provide security, integrity, data aggregation and robustness in WSN. In this paper, several issues and challenges, as well as the various threats of WMSN, is briefly discussed. Also, we have discussed the digital watermarking techniques and its role in WMSN.

Keywords: Data aggregation, integrity, security, watermark, WMSN, WSN.

Graphical Abstract

[1]
K. Zheng, and D. Zhao, "Novel Quick Start (QS) method for optimization of TCP", Wirel. Netw., vol. 22, no. 1, pp. 211-222, 2016.
[http://dx.doi.org/10.1007/s11276-015-0968-2]
[2]
K. Zheng, and T. Zhang, "A novel multicast routing method with minimum transmission for WSN of cloud computing service", Soft Comput., vol. 19, no. 7, pp. 1817-1827, 2015.
[http://dx.doi.org/10.1007/s00500-014-1366-x]
[3]
D. Zhang, and H. Ge, "New Multi-hop clustering algorithm for vehicular ad hoc networks", IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 4, pp. 1517-1530, 2019.
[http://dx.doi.org/10.1109/TITS.2018.2853165]
[4]
H.L. Niu, "Novel PEECR-based clustering routing approach", Soft Comput., vol. 21, no. 24, pp. 7313-7323, 2017.
[http://dx.doi.org/10.1007/s00500-016-2270-3]
[5]
S. Liu, "Novel Dynamic Source Routing Protocol (DSR) based on Genetic Algorithm-Bacterial Foraging Optimization (GA-BFO)", Int. J. Commun. Syst., vol. 31, no. 18, pp. 1-20, 2018.
[http://dx.doi.org/10.1002/dac.3824]
[6]
X. Wang, and X. Song, "New clustering routing method based on PECE for WSN", EURASIP J. Wirel. Commun. Netw., vol. 2015, no. 162, pp. 1-13, 2015.
[http://dx.doi.org/10.1186/s13638-015-0399-x]
[7]
S. Zhou, "A low duty cycle efficient MAC protocol based on self-adaption and predictive strategy", Mob. Netw. Appl., vol. 23, no. 4, pp. 828-839, 2018.
[http://dx.doi.org/10.1007/s11036-017-0878-x]
[8]
D. Zhang, "A new approach and system for attentive mobile learning based on seamless migration", Appl. Intell., vol. 36, no. 1, pp. 75-89, 2012.
[http://dx.doi.org/10.1007/s10489-010-0245-0]
[9]
B. Harjito, and S. Han, "Wireless multimedia sensor networks applications and security challenges", International Conference on Broadband, Wireless Computing, Communication and Applications, 2010pp. 842-846
[http://dx.doi.org/10.1109/BWCCA.2010.182]
[10]
X. Wang, and X. Song, "New medical image fusion approach with coding based on SCD in wireless sensor network", J. Electr. Eng. Technol., vol. 10, no. 6, pp. 2384-2392, 2015.
[http://dx.doi.org/10.5370/JEET.2015.10.6.2384]
[11]
B. Harjito, V. Potdar, and J. Singh, "Watermarking technique for copyright protection of wireless sensor network data using LFSR and Kolmogorov complexity", In Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012pp. 208-217
[http://dx.doi.org/10.1145/2428955.2428995]
[12]
F. Shih, Digital Watermarking and Steganography., CRC Press: Boca Raton, 2017.
[http://dx.doi.org/10.1201/9781315121109]
[13]
H. Wang, "Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks", J. Supercomput., vol. 64, no. 3, pp. 883-897, 2013.
[http://dx.doi.org/10.1007/s11227-010-0500-5]
[14]
D. Zhang, G. Li, and K. Zheng, "An energy-balanced routing method based on forward-aware factor for wireless sensor network", IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 766-773, 2014.
[http://dx.doi.org/10.1109/TII.2013.2250910]
[15]
T. Zhang, "Novel self-adaptive routing service algorithm for application of VANET", Appl. Intell., vol. 49, no. 5, pp. 1866-1879, 2019.
[http://dx.doi.org/10.1007/s10489-018-1368-y]
[16]
J. Chen, G. Mao, C. Li, and D. Zhang, "A topological approach to secure message dissemination in vehicular networks", IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 1, pp. 135-148, 2019.
[http://dx.doi.org/10.1109/TITS.2018.2889746]
[17]
J. Chen, and G. Mao, "Capacity of cooperative vehicular networks with infrastructure support: Multi-user case", IEEE Transactions on Vehicular Technology, vol. 67, no. 2, pp. 1546-1560, 2018.
[http://dx.doi.org/10.1109/TVT.2017.2753772]
[18]
X. Liu, "A new algorithm of the best path selection based on machine learning", IEEE Access, vol. 7, no. 1, pp. 126913-126928, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2939423]
[19]
T. Zhang, and J. Zhang, "A kind of effective data aggregating method based on compressive sensing for wireless sensor network", EURASIP J. Wirel. Commun. Netw., vol. 2018, no. 159, pp. 1-15, 2018.
[http://dx.doi.org/10.1186/s13638-018-1176-4]
[20]
M. Ghadi, L. Laouamer, and T. Moulahi, "Securing data exchange in wireless multimedia sensor networks: perspectives and challenges", Multimedia Tools Appl., vol. 75, no. 6, pp. 3425-3451, 2016.
[http://dx.doi.org/10.1007/s11042-014-2443-y]
[21]
X. Zhang, "Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application", Enterprise Inf. Syst., vol. 6, no. 4, pp. 473-489, 2012.
[http://dx.doi.org/10.1080/17517575.2011.626872]
[22]
Y. Zhu, "A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the Internet of Things (IOT)", Comput. Math. Appl., vol. 64, no. 5, pp. 1044-1055, 2012.
[http://dx.doi.org/10.1016/j.camwa.2012.03.023]
[23]
H. Agarwal, D. Sen, B. Raman, and M. Kankanhalli, "Visible watermarking based on importance and just noticeable distortion of image regions", Multimedia Tools Appl., vol. 75, no. 13, pp. 7605-7629, 2016.
[http://dx.doi.org/10.1007/s11042-015-2685-3]
[24]
N. Agarwal, A.K. Singh, and P.K. Singh, "Survey of robust and imperceptible watermarking", Multimedia Tools Appl., vol. 78, no. 7, pp. 8603-8633, 2019.
[http://dx.doi.org/10.1007/s11042-018-7128-5]
[25]
V. Dhiman, and P. Khandnor, "Watermarking schemes for secure data aggregation in wireless sensor networks: A review paper", In 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016pp. 3093-3098
[http://dx.doi.org/10.1109/ICEEOT.2016.7755270]
[26]
D.E. Boubiche, S. Boubiche, and A. Bilami, "A cross-layer watermarking-based mechanism for data aggregation integrity in heterogeneous WSNs", IEEE Communications Lett., vol. 19, no. 5, pp. 823-826, 2015.
[http://dx.doi.org/10.1109/LCOMM.2015.2409057]
[27]
D.E. Boubiche, S. Boubiche, H. Toral-Cruz, A.S.K. Pathan, A. Bilami, and S. Athmani, "SDAW: Secure data aggregation watermarking-based scheme in homogeneous WSNs", Telecomm. Syst., vol. 62, no. 2, pp. 277-288, 2016.
[http://dx.doi.org/10.1007/s11235-015-0047-0]
[28]
T. Zhang, "A kind of novel method of power allocation with limited cross-tier interference for CRN", IEEE Access, vol. 7, no. 1, pp. 82571-82583, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2921310]
[29]
X. Dong, and X. Li, "An authentication method for self nodes based on watermarking in wireless sensor networks", In 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009p. 1-4
[http://dx.doi.org/10.1109/WICOM.2009.5302423]
[30]
B. Wang, J. Su, Y. Zhang, B. Wang, J. Shen, Q. Ding, and X. Sun, "A copyright protection method for wireless sensor networks based on digital watermarking", Int. J. Hybrid Inf. Technol., vol. 8, no. 6, pp. 257-268, 2015.
[http://dx.doi.org/10.14257/ijhit.2015.8.6.25]
[31]
X. Yan, L. Zhang, Y. Wu, Y. Luo, and X. Zhang, "Secure smart grid communications and information integration based on digital watermarking in wireless sensor networks", Enterprise Inf. Syst., vol. 11, no. 2, pp. 223-249, 2017.
[http://dx.doi.org/10.1080/17517575.2015.1033767]
[32]
C. Kumar, A.K. Singh, and P. Kumar, "A recent survey on image watermarking techniques and its application in e-governance", Multimedia Tools Appl., vol. 77, no. 3, pp. 3597-3622, 2018.
[http://dx.doi.org/10.1007/s11042-017-5222-8]
[33]
S. Chouikhi, I. El Korbi, Y. Ghamri-Doudane, and L.A. Saidane, "A survey on fault tolerance in small and large scale wireless sensor networks", Comput. Commun., vol. 69, pp. 22-37, 2015.
[http://dx.doi.org/10.1016/j.comcom.2015.05.007]
[34]
T.C. Aysal, and K.E. Barner, "Sensor data cryptography in wireless sensor networks", IEEE Transaction on Information Forensics and Security,, vol. 3, no. 2, pp. 273-289, 2008.
[http://dx.doi.org/10.1109/TIFS.2008.919119]
[35]
D. Gonçalves, and D. Costa, "A survey of image security in wireless sensor networks", J. Imaging, vol. 1, no. 1, pp. 4-30, 2015.
[http://dx.doi.org/10.3390/jimaging1010004]
[36]
S.A. Haque, M. Rahman, and S.M. Aziz, "Sensor anomaly detection in wireless sensor networks for healthcare", Sensors (Basel), vol. 15, no. 4, pp. 8764-8786, 2015.
[http://dx.doi.org/10.3390/s150408764] [PMID: 25884786]
[37]
A. Rasheed, and R.N. Mahapatra, "The three-tier security scheme in wireless sensor networks with mobile sinks", IEEE Transactions on Parallel Distributed Systems, vol. 23, no. 5, pp. 958-965, 2010.
[http://dx.doi.org/10.1109/TPDS.2010.185]
[38]
P. Duan, "A unified spatio-temporal model for short-term traffic flow prediction", IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 9, pp. 3212-3223, 2019.
[http://dx.doi.org/10.1109/TITS.2018.2873137]
[39]
C. Chen, and Y.Y. Cui, "New method of energy efficient subcarrier allocation based on evolutionary game theory", Mob. Netw. Appl., vol. 9, pp. 1-15, 2018.
[http://dx.doi.org/10.1007/s11036-018-1123-y]
[40]
J. Yang, and G. Mao, "Optimal base station antenna downtilt in downlink cellular networks", IEEE Transactions on Wireless Communications, vol. 18, no. 3, pp. 1779-1791, 2019.
[http://dx.doi.org/10.1109/TWC.2019.2897296]
[41]
K. Hameed, A. Khan, M. Ahmed, A.G. Reddy, and M.M. Rathore, "Towards a formally verified zero watermarking scheme for data integrity in the internet of things based-wireless sensor networks", Future Gener. Comput. Syst., vol. 82, pp. 274-289, 2018.
[http://dx.doi.org/10.1016/j.future.2017.12.009]
[42]
N. Rouissi, H. Gharsellaoui, and S. Bouamama, "A new spread spectrum based approach for ensuring energy efficiency and security in wireless sensor networks", Int. J. Adv. Pervasive Ubiquitous Comput., vol. 10, no. 4, pp. 45-57, 2018.
[http://dx.doi.org/10.4018/IJAPUC.2018100104]
[43]
J. Zhu, Y. Zou, and B. Zheng, "Physical-layer security and reliability challenges for industrial wireless sensor networks", IEEE Access, vol. 5, pp. 5313-5320, 2017.
[http://dx.doi.org/10.1109/ACCESS.2017.2691003]
[44]
B. Harjito, S. Han, V. Potdar, E. Chang, and M. Xie, "Secure communication in wireless multimedia sensor networks using watermarking", In 4th IEEE International Conference on Digital Ecosystems and Technologies, 2010pp. 640-645
[http://dx.doi.org/10.1109/DEST.2010.5610580]
[45]
J. Gao, "Novel approach of distributed & adaptive trust metrics for MANET", Wirel. Netw., vol. 25, no. 6, pp. 3587-3603, 2019.
[http://dx.doi.org/10.1007/s11276-019-01955-2]
[46]
P. Zhao, and Y. Cui, "A new method of mobile ad hoc network routing based on greed forwarding improvement strategy", IEEE Access, vol. 7, no. 1, pp. 158514-158524, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2950266]
[47]
D. Zhang, X. Wang, and X. Song, "A novel approach to mapped correlation of ID for RFID anti-collision", IEEE Transactions on Services Computing, vol. 7, no. 4, pp. 741-748, 2014.
[http://dx.doi.org/10.1109/TSC.2014.2370642]
[48]
M.L. Messai, and H. Seba, "EAHKM+: Energy-aware secure clustering scheme in wireless sensor networks", Int. J. High Perform. Comput. Netw., vol. 11, no. 2, pp. 145-155, 2018.
[http://dx.doi.org/10.1504/IJHPCN.2018.089895]
[49]
T. Zhang, "Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning", J. Netw. Comput. Appl., vol. 2018, no. 122, pp. 37-49, 2018.
[http://dx.doi.org/10.1016/j.jnca.2018.07.018]
[50]
Y. Tang, "Novel reliable routing method for engineering of internet of vehicles based on graph theory", Eng. Comput., vol. 36, no. 1, pp. 226-247, 2019.
[http://dx.doi.org/10.1108/EC-07-2018-0299]
[51]
S. Liu, D.G. Zhang, X.H. Liu, T. Zhang, J.X. Gao, and Y.Y. Cui, "Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios", IEEE Access, vol. 7, pp. 21343-21358, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2896699]
[52]
I. Kamel, and H. Juma, "Simplified watermarking scheme for sensor networks", Int. J. Internet Protoc. Technol., vol. 5, no. 1-2, pp. 101-111, 2010.
[http://dx.doi.org/10.1504/IJIPT.2010.032619]
[53]
A. Alromih, M. Al-Rodhaan, and Y. Tian, "A randomized watermarking technique for detecting malicious data injection attacks in heterogeneous wireless sensor networks for internet of things applications", Sensors (Basel), vol. 18, no. 12, p. 4346, 2018.
[http://dx.doi.org/10.3390/s18124346] [PMID: 30544877]
[54]
Y. Ren, Y. Cheng, J. Wang, and L. Fang, "Data protection based on multifunction digital watermark in wireless sensor network", 2015 International Carnahan Conference on Security Technology (ICCST), 2015pp. 37-41
[http://dx.doi.org/10.1109/CCST.2015.7389654]
[55]
X. Shi, and D. Xiao, "A reversible watermarking authentication scheme for wireless sensor networks", Inf. Sci., vol. 240, pp. 173-183, 2013.
[http://dx.doi.org/10.1016/j.ins.2013.03.031]
[56]
J. Cui, "Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks", Peer-to-Peer Netw. Appl., vol. 11, no. 5, pp. 1022-1037, 2018.
[http://dx.doi.org/10.1007/s12083-017-0581-5]
[57]
J. Xu, "A survey on the privacy-preserving data aggregation in wireless sensor networks", China Commun., vol. 12, no. 5, pp. 162-180, 2015.
[http://dx.doi.org/10.1109/CC.2015.7112038]
[58]
C. Castelluccia, and A. Spognardi, "Rok: A robust key pre-distribution protocol for multi-phase wireless sensor networks", In Third International Conference on Security and Privacy in Communications Networks and the Workshops – SecureComm, IEEE, 2007p. 351-360
[http://dx.doi.org/10.1109/SECCOM.2007.4550354]
[59]
J. Sun, W. Wang, L. Kou, Y. Lin, L. Zhang, Q. Da, and L. Chen, "A data authentication scheme for UAV ad hoc network communication", J. Supercomput., vol. 76, no. 6, pp. 4041-4056, 2020.
[http://dx.doi.org/10.1007/s11227-017-2179-3]
[60]
T. Chuman, W. Sirichotedumrong, and H. Kiya, "Encryption-then-compression systems using grayscale-based image encryption for JPEG images", IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1515-1525, 2018.
[http://dx.doi.org/10.1109/TIFS.2018.2881677]
[61]
S.H. Jokhio, I.A. Jokhio, and A.H. Kemp, "Light-weight framework for security-sensitive wireless sensor networks applications", IET Wireless Sensor Systems, vol. 3, no. 4, pp. 298-306, 2013.
[http://dx.doi.org/10.1049/iet-wss.2012.0127]
[62]
S.B. Sasi, D. Dixon, J. Wilson, and P. No, "A general comparison of symmetric and asymmetric cryptosystems for WSNs and an overview of location based encryption technique for improving security", IOSR J. Eng., vol. 4, no. 3, p. 1, 2014.
[http://dx.doi.org/10.9790/3021-04330104]
[63]
A. Sen, T. Chatterjee, and S. DasBit, "LoWaNA: Low overhead watermark based node authentication in WSN", Wirel. Netw., vol. 22, no. 7, pp. 2453-2467, 2016.
[http://dx.doi.org/10.1007/s11276-015-1157-z]
[64]
D. Singh, and S.K. Singh, "DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection", Multimedia Tools Appl., vol. 76, no. 11, pp. 13001-13024, 2017.
[http://dx.doi.org/10.1007/s11042-016-3706-6]
[65]
S.B. Othman, "Confidentiality and integrity for data aggregation in WSN using homomorphic encryption", Wireless Personal Communications, vol. 80, no. 2, pp. 867-889, 2015.
[http://dx.doi.org/10.1007/s11277-014-2061-z]
[66]
V.T. Nguyen, T.M. Hoang, T.A. Duong, Q.S. Nguyen, and V.H. Bui, "A lightweight watermark scheme utilizing MAC layer behaviors for wireless sensor networks", In 2019 3rd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom), 2019p. 176-180
[http://dx.doi.org/10.1109/SIGTELCOM.2019.8696234]
[67]
A. Ferdowsi, and W. Saad, "Deep learning for signal authentication and security in massive internet-of-things systems", IEEE Transactions on Communications, vol. 67, no. 2, pp. 1371-1387, 2018.
[http://dx.doi.org/10.1109/TCOMM.2018.2878025]
[68]
Y. Xiao, and G. Gao, "Digital watermark-based independent individual certification scheme in WSNs", IEEE Access, vol. 7, pp. 145516-145523, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2945177]
[69]
C.F. Lee, J.J. Shen, Z.R. Chen, and S. Agrawal, "Self-embedding authentication watermarking with effective tampered location detection and high-quality image recovery", Sensors (Basel), vol. 19, no. 10, p. 2267, 2019.
[http://dx.doi.org/10.3390/s19102267] [PMID: 31100886]
[70]
K. Shankar, and M. Elhoseny, An optimal singular value decomposition with LWC-RECTANGLE block cipher based digital image watermarking in wireless sensor networks.In Secure Image Transmission in Wireless Sensor Network (WSN) Applications., Springer: Cham, 2019, pp. 83-98.
[http://dx.doi.org/10.1007/978-3-030-20816-5_6]
[71]
B. Wang, J. Su, Y. Zhang, B. Wang, J. Shen, Q. Ding, and X. Sun, "A copyright protection method for wireless sensor networks based on digital watermarking", Int. J. Hybrid Inf. Technol., vol. 8, no. 6, pp. 257-268, 2015.
[http://dx.doi.org/10.14257/ijhit.2015.8.6.25]
[72]
L.F. de Jorge, L. Pirmez, C.M. de Farias, R.O. de Costa, D.R. Boccardo, and L.F.R. da Carmo, "Sensor Watermark: A scheme of software watermark using code obfuscation and tamperproofing for WSN", In 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), 2015pp. 916-922
[http://dx.doi.org/10.1109/IWCMC.2015.7289205]