Show simple item record

dc.contributor.authorHarjito, Bambang
dc.contributor.authorPotdar, Vidyasagar
dc.contributor.authorSingh, Jaipal
dc.date.accessioned2017-12-10T12:39:44Z
dc.date.available2017-12-10T12:39:44Z
dc.date.created2017-12-10T12:20:17Z
dc.date.issued2012
dc.identifier.citationHarjito, B. and Potdar, V. and Singh, J. 2012. Watermarking technique for copyright protection of wireless sensor network data using LFSR and Kolmogorov complexity, in Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia Conference (MoMM), Dec 3-5 2012, pp. 208-217. Bali, Indonesia: ACM International Conference Proceedings.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/59327
dc.identifier.doi10.1145/2428955.2428995
dc.description.abstract

The function of Wireless Sensor Networks (WSNs) is to collect and store data sent to other nodes or servers. Current technologies allow validation during transit, but stop after the data reaches its destination. One of the challenges with these technologies is to ensure that the source of the data is preserved, once it leaves the WSN. This is important as the data can be used by other applications or distributed to other parties. Therefore, it needs to be ensured that the data source is identifiable and the data is valid. Sensors are susceptible to various types of attack, such as data modification, data insertion and deletion, or even physical capture and sensor replacement. Hence, security becomes an important issue with WSNs. The traditional algorithms are used for securing data transmission between sensor nodes. However these algorithms need millions of multiplication instructions to perform operations, and cannot efficiently protect the copyright of the valuable sensor data. Watermarking is one of the effective choices to overcome this challenge. Watermark adds a second line of defense to ensure that the data is valid, even if someone cracks the encryption. This paper proposes a watermarking technique for copyright protection of data in WSNs. It also provides performance evaluation of the technique to show its robustness against various types of attacks, like data deletion, packet replication and Sybil attacks.

dc.titleWatermarking technique for copyright protection of wireless sensor network data using LFSR and Kolmogorov complexity
dc.typeConference Paper
dcterms.source.startPage208
dcterms.source.endPage217
dcterms.source.titleACM International Conference Proceeding Series
dcterms.source.seriesACM International Conference Proceeding Series
dcterms.source.isbn9781450313070
dcterms.source.conference10th International Conference on Advances in Mobile Computing and Multimedia, MoMM 201
dcterms.source.placeIndonesia
curtin.departmentSchool of Information Systems
curtin.accessStatusFulltext not available


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record