Node to Node Watermarking in Wireless Sensor Networks for Authentication of Self Nodes
Journal Title: Journal of Information Systems and Telecommunication - Year 2014, Vol 2, Issue 2
Abstract
In order to solve some security issues in Wireless Sensor Networks (WSNs), node to node authentication method based on digital watermarking technique for verification of relative nodes is proposed. In the proposed method, some algorithms with low computational for generation, embedding and detection of security ID are designed. The collected data packets by the nodes are marked using security ID. In the proposed method, header is used to mark the packets. Since the nature of the sensor networks is cooperative, using the head of the packets is proposed for authentication. Also using the marked head can prevent from sending and receiving fake data in the other nodes. Simulations have been performed in environments with imposing unrealistic data and having a probability from 1% to 10%. Comparing the proposed method with other methods shows that the proposed method in term of security, reducing traffic and increasing network lifetime is more effective.
Authors and Affiliations
Hasan Farsi, Seyed Morteza Nourian
Optimal Sensor Scheduling Algorithms for Distributed Sensor Networks
In this paper, a sensor network is used to estimate the dynamic states of a system. At each time step, one (or multiple) sensors are available that can send its measured data to a central node, in which all of processing...
An Approach to Compose Viewpoints of Different Stakeholders in the Specification of Probabilistic Systems
Developing large and complex systems often involves many stakeholders each of which has her own expectations from the system; hence, it is difficult to write a single formal specification of the system considering all of...
A Robust Data Envelopment Analysis Method for Business and IT Alignment of Enterprise Architecture Scenarios
Information Technology is recognized as a competitive enabler in today’s dynamic business environment. Therefore, alliance of business and Information Technology process is critical, which is mostly emphasized in Informa...
Fusion of Learning Automata to Optimize Multi-constraint Problem
This paper aims to introduce an effective classification method of learning for partitioning the data in statistical spaces. The work is based on using multi-constraint partitioning on the stochastic learning automata. S...
Identification of a Nonlinear System by Determining of Fuzzy Rules
In this article the hybrid optimization algorithm of differential evolution and particle swarm is introduced for designing the fuzzy rule base of a fuzzy controller. For a specific number of rules, a hybrid algorithm for...