Title | ||
---|---|---|
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. |
Abstract | ||
---|---|---|
The Internet of Things (IoT) is an emerging paradigm in which billions of devices communicate, thus producing and exchanging information related to real world objects (things). Sensor nodes are specialized nodes for handling transmission of a large volume of data in situations where the source nodes communicate with base stations (BS) via a set of intermediate nodes. Applications based on WSN claim that integrity and trustworthiness are the key aspects as the data received from source nodes is the major source for BS to take critical decisions. To establish the trustworthiness between sensor node and BS, a novel zero watermarking scheme is proposed in this paper. In order to ensure integrity and trustworthiness, our proposed scheme embeds a watermark in original data before it is transmitted to BS which is responsible for verifying the watermark embedded with data. We have compared proposed scheme with existing Asymmetric Cryptography (ACT) and Reversible Watermarking (RW) schemes based on the performance parameters such as computational overhead and the energy utilization. Analysis results suggest that proposed scheme can handle multiple attacks on data and watermark such as data deletion, data modification, and data insertion attack. Moreover, our experimental results demonstrate that the presented scheme is lightweight, computationally efficient, and better in energy utilization. A formal verification for proof of correctness using high level Petri nets (HLPNs) is also provided to verify the claims of our work. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1016/j.future.2017.12.009 | Future Generation Computer Systems |
Keywords | Field | DocType |
Zero watermarking,Data integrity,Sensor networks,High level Petri nets(HLPN) | Sensor node,Overhead (computing),Digital watermarking,Computer science,Watermark,Data integrity,Wireless sensor network,Public-key cryptography,Distributed computing,Formal verification | Journal |
Volume | ISSN | Citations |
82 | 0167-739X | 8 |
PageRank | References | Authors |
0.57 | 23 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Khizar Hameed | 1 | 17 | 2.18 |
Abid Khan | 2 | 80 | 18.94 |
Mansoor Ahmed | 3 | 36 | 6.50 |
Goutham Reddy Alavalapati | 4 | 85 | 8.09 |
muhammad mazhar ullah rathore | 5 | 301 | 21.15 |