Abstract
Wireless sensor networks (WSNs) are one of the main elements of information acquisition technologies in the Internet of Things (IoT). They are broadly used in managing instruments such as smart meters and health monitoring. The data is prone to manipulation; thus, a secure method is necessary to ensure data integrity. The objectives of this research are to compare lightweight and secure reversible watermarking schemes for data integrity in WSN; elaborate on the influential factors affecting on the system performance; describe the overhead of each security factor in terms of time, memory and energy consumption regarding the computational complexity and, finally, assess the robustness of each scheme to resist against attacks. Taking advantage of the results of this research, we expect that it would be inspiring for researchers to design secure IoT applications such as smart meters by extending these elaborated measurements. We also propose several tips for designing lightweight and secure data integrity methods in IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kore, A., Patil, S.: Cross layered cryptography based secure routing for IoT-enabled smart healthcare system. Wireless Netw. 28(1), 287–301 (2021). https://doi.org/10.1007/s11276-021-02850-5
Demertzi, V., Demertzis, S., Demertzis, K.: An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities. arXiv preprint arXiv:2207.04424 (2022)
Vani, G., Shariff, N.C., Biradar, R.K.L.: An investigation of secure authentication systems in wireless sensor networks. Int. J. Early Childhood 14, 2022 (2022)
Sumathi, A.C., Akila, M., Pérez de Prado, R., Wozniak, M., Divakarachari, P.B.: Dynamic bargain game theory in the internet of things for data trustworthiness. Sensors 21, 7611 (2021)
Mo, J., Hu, Z., Shen, W.: A provably secure three-factor authentication protocol based on chebyshev chaotic mapping for wireless sensor network. IEEE Access 10, 12137–12152 (2022)
Wang, C., Bai, Y., Mo, X.: Data secure transmission model based on compressed sensing and digital watermarking technology. Wuhan Univ. J. Nat. Sci. 19(6), 505–511 (2014). https://doi.org/10.1007/s11859-014-1045-x
Venkatachalam, C., Suresh, D.: Combinatorial Asymmetric Key Cryptosystem and Hash Based Multifactor Authentication Techniques for Secured Data Communication in WSN (2022)
Kumar, S., Singh, B.K., Pundir, S., Joshi, R., Batra, S.: Role of digital watermarking in wireless sensor network. Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), vol. 15, pp. 215–228 (2022)
Gao, G., Feng, Z., Han, T.: Data authentication for wireless sensor networks with high detection efficiency based on reversible watermarking. Wireless Commun. Mobile Comput. 2021 (2021)
Wang, C.-F., Wu, A.-T., Huang, S.-C.: An energy conserving reversible and irreversible digital watermarking hybrid scheme for cluster-based wireless sensor networks. J. Internet Technol. 19, 105–114 (2018)
Kabir, F., Qureshi, A., Megıas, D.: A Study on Privacy-Preserving Data Aggregation Techniques for Secure Smart Metering System (2020)
Araghi, T.K.: Digital image watermarking and performance analysis of histogram modification based methods. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) SAI 2018. AISC, vol. 858, pp. 631–637. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-01174-1_49
Araghi, T.K., Alarood, A.A., Araghi, S.K.: Analysis and evaluation of template based methods against geometric attacks: a survey. In: Saeed, F., Mohammed, F., Al-Nahari, A. (eds.) IRICT 2020. LNDECT, vol. 72, pp. 807–814. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-70713-2_73
Li, X., Peng, J., Obaidat, M.S., Wu, F., Khan, M.K., Chen, C.: A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. 14, 39–50 (2019)
Yi, S., Zhou, Y.: Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans. Multimedia 21, 51–64 (2018)
Jagadeesh, S., Parida, A.K., Meenakshi, K., Pradhan, S.: Review on difference expansion based reversible watermarking. In: 2022 3rd International Conference for Emerging Technology (INCET), pp. 1–5 (2022)
Guo, H., Li, Y., Jajodia, S.: Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci. 177, 281–298 (2007)
Shi, X., Xiao, D.: A reversible watermarking authentication scheme for wireless sensor networks. Inf. Sci. 240, 173–183 (2013)
Liu, X., Ge, Y., Zhu, Y., Wu, D.: A lightweight integrity authentication scheme based on reversible watermark for wireless body area networks. KSII Trans. Internet Inform. Syst. 8, 4643–4660 (2014)
Huang, C.: Wireless sensor networks data processing summary based on compressive sensing. Sens. Transduc. 174, 67 (2014)
Ding, Q., Wang, B., Sun, X., Wang, J., Shen, J.: A reversible watermarking scheme based on difference expansion for wireless sensor networks. Int. J. Grid Distrib. Comput. 8, 143–154 (2015)
Vadlamudi, S., Islam, A., Hossain, S., Ahmed, A.A.A., Asadullah, A.: Watermarking techniques for royalty accounts in content management websites for IoT image association. Acad. Market. Stud. J. 25, 1–9 (2021)
Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: Analyzing the energy consumption of security protocols. In: Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003. ISLPED 2003, pp. 30–35 (2003)
Araghi, T.K., Manaf, A.B.T.A.: Evaluation of digital image watermarking techniques. In: Saeed, F., Gazem, N., Patnaik, S., Saed Balaid, A.S., Mohammed, F. (eds.) IRICT 2017. LNDECT, vol. 5, pp. 361–368. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-59427-9_39
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Araghi, T.K., Megías, D., Rosales, A. (2023). Evaluation and Analysis of Reversible Watermarking Techniques in WSN for Secure, Lightweight Design of IoT Applications: A Survey. In: Arai, K. (eds) Advances in Information and Communication. FICC 2023. Lecture Notes in Networks and Systems, vol 652. Springer, Cham. https://doi.org/10.1007/978-3-031-28073-3_47
Download citation
DOI: https://doi.org/10.1007/978-3-031-28073-3_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28072-6
Online ISBN: 978-3-031-28073-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)