Computer Science ›› 2023, Vol. 50 ›› Issue (8): 333-341.doi: 10.11896/jsjkx.220800089

• Information Security • Previous Articles     Next Articles

Recoverable Data Aggregation Protocol for Wireless Sensor Networks Based on Reversible DigitalWatermarking

GAO Guangyong1,2,3, HAN Tingting1,3, XIA Zhihua4   

  1. 1 Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science & Technology, Nanjing 210044, China
    2 School of Computer and Big Data Science,Jiujiang University,Jiujiang,Jiangxi 332005,China
    3 School of Computer Science,Nanjing University of Information Science & Technology,Nanjing 210044,China
    4 College of Cyber Security,Jinan University,Guangzhou 510632,China
  • Received:2022-08-09 Revised:2022-11-22 Online:2023-08-15 Published:2023-08-02
  • About author:GAO Guangyong,born in 1973,Ph.D,professor,is a senior member of China Computer Federation.His main research interests include reversible data hiding,computer networks security,multimedia information security,and digital image processing.
    XIA Zhihua,born in 1983,Ph.D,professor,Ph.D supervisor,is a senior member of China Computer Federation.His main research interests include digital forensic and encrypted image proces-sing.
  • Supported by:
    Key Program of the Natural Science Foundation of Jiangxi Province,China(20192ACBL20031),National Natural Science Foundation of China(61662039,62122032,U1936118),National Key Research and Development Program of China(2020YFB1005600) and Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology(NUIST)(2019r070).

Abstract: Aiming at the opposition between the high energy consumption of data security authentication protocol and the resource limitation of sensor nodes in wireless sensor networks,this paper proposes an aggregation protocol based on reversible di-gital watermarking.On the one hand,at the sensing node,the watermarking is embedded into the sensing data,and the elliptic curve is used to encrypt the watermarked data homomorphically,so as to ensure the privacy of the data in the transmission process.At the cluster head node,the received data are only performed aggregation and forwarding operations,so as to reduce network communication overhead.At the base station,the watermark is extracted to authenticate the integrity of data.On the other hand,this scheme proposes an aggregation tree protocol based on clustering protocol,which can reduce the transmission energy consumption of nodes and prolong the network lifetime.Theoretical analysis proves that the proposed protocol combines watermarking technology and data aggregation technology better,has good security and lower computation cost,and can realize the integrity authentication of perception data.In addition,experimental results show that,compared with the latest similar algorithms,the proposed protocol has certain advantages in communication cost and delay.

Key words: Reversible digital watermarking, Integrity verification, Data aggregation, Homomorphic encryption

CLC Number: 

  • TP393
[1]JAN S R U,KHAN R,JAN M A.An energy-efficient data aggregation approach for cluster-based wireless sensor networks[J].Annals of Telecommunications,2021,76(5):321-329.
[2]MANDEEP K,AMIT M.Data aggregation algorithms for wireless sensor network:A review[J].Ad Hoc Networks,2020,100(3):102083.
[3]SANKARALINGAM S K,NARMADHA A S.Energy aware decision stump linear programming boosting node classification based data aggregation in WSN[J].Computer Communications,2020,155:133-142.
[4]ADAM M S,ANIST M H,ALI I.Object tracking sensor networks in smart cities:Taxonomy,architecture,applications,research challenges and future directions[J].Future Generation Computer Systems,2020,107:909-923.
[5]GOMATHI S,GOPALA K C.Malicious node detection in wireless sensor networks using an efficient secure data aggregation protocol[J].Wireless Personal Communications,2020,113(4):1775-1790.
[6]ADNAN M,YANG L,AHMAD T,et al.An unequally clus-tered multi-hop routing protocol based on fuzzy logic for wireless sensor networks[J].IEEE Access,2021,9:38531-38545.
[7]JURADO-LASSO F F,CLARKE K,CADAVID A N,et al.Energy-aware routing for software-defined multihop wireless sensor networks[J].IEEE Sensors Journal,2021,21(8):10174-10182.
[8]LIU X,YU J,LI F,et al.Data aggregation in wireless sensor networks:from the perspective of security[J].IEEE Internet of Things Journal,2019,7(7):6495-6513.
[9]RAWAT P,CHAUHAN S.A Novel Cluster Head Selection and Data Aggregation Protocol for Heterogeneous Wireless Sensor Network[J].Arabian Journal for Science and Engineering,2022,47:1971-1986.
[10]ZHANG J,HU P,XIE F,et al.An energy efficient and reliable in-network data aggregation scheme for WSN[J].IEEE Access,2018,6:71857-71870.
[11]HE W,LIU X,NGUYEN H,et al.PDA:Privacy-preservingdata aggregation in wireless sensor networks[C]//26th IEEE International Conference on Computer Communications(IEEE INFOCOM 2007).IEEE,2007:2045-2053.
[12]HE W,LIU X,NGUYEN H V,et al.PDA:privacy-preserving data aggregation for information collection[J].ACM Transactions on Sensor Networks(TOSN),2011,8(1):1-22.
[13]FANG W,WEN X Z,XU J,et al.CSDA:a novel cluster-based secure data aggregation scheme for WSNs[J].Cluster Computing,2019,22(3):5233-5244.
[14]HUA P,LIU X,YU J,et al.Energy-efficient adaptive slice-based secure data aggregation scheme in WSN[J].Procedia Computer Science,2018,129:188-193.
[15]ZHANG X,LIU X,YU J,et al.Energy-efficient privacy preserving data aggregation protocols based on slicing[C]//2019 International Conference on Internet of Things(iThings) and IEEE Green Computing and Communications(GreenCom) and IEEE Cyber,Physical and Social Computing(CPSCom) and IEEE Smart Data(SmartData).IEEE,2019:546-551.
[16]ZHOU L,GE C,HU S,et al.Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks[J].IEEE Internet of Things Journal,2019,7(5):3948-3957.
[17]HE W,LIU X,NGUYEN H,et al.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]//2009 29th IEEE International Conference on Distributed Computing Systems Workshops.IEEE,2009:14-19.
[18]WANG T,QIN X,DING Y,et al.Privacy-preserving and energy-efficient continuous data aggregation algorithm in wireless sensor networks[J].Wireless Personal Communications,2018,98(1):665-684.
[19]NELS S N,SINGH J.Security-aware authorization and verification based data aggregation model for wireless sensor networks[J].International Journal of Numerical Modelling:Electronic Networks,Devices and Fields,2021,34(3):e2844.
[20]CHEN C M,LIN Y H,LIN Y C,et al.RCDA:Recoverable concealed data aggregation for data integrity in wireless sensor networks[J].IEEE Transactions on parallel and distributed systems,2011,23(4):727-734.
[21]YANG L,DING C,WU M.RPIDA:Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks[J].KSII Transactions on Internet and Information Systems(TIIS),2015,9(12):5189-5208.
[22]SHEN L,MA J,LIU X,et al.A secure and efficient id-based aggregate signature scheme for wireless sensor networks[J].IEEE Internet of Things Journal,2016,4(2):546-554.
[23] MIN W,RUIXIANG C,SHUNBIN H.A Secure Data Aggregation Approach in Hierarchical Wireless Sensor Networks[C]//the 10th International Conference.ACM,2016:1-7.
[24]ANITA D D,ROSLIN S E.Data validation and integrity verifi-cation for trust based data aggregation protocol in WSN[J].Microprocessors and Microsystems,2021,80(1):1-6.
[25]KUMAR S,SINGH B K,PUNDIR S,et al.Role of Digital Watermarking in Wireless Sensor Network[J].Recent Advances in Computer Science and Communications(Formerly:Recent Patents on Computer Science),2022,15(2):215-228.
[26]WAZIRALI R,AHMAD R,AL-AMAYREH A,et al.Securewatermarking schemes and their approaches in the iot technology:an overview[J].Electronics,2021,10(14):1744.
[27]SHI X,XIAO D.A reversible watermarking authenticationscheme for wireless sensor networks[J].Information Sciences,2013,240:173-183.
[28]ALROMIH A,AL-RODHAAN M,TIAN Y.A RandomizedWatermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications[J].Sensors,2018,18(12):4346.
[29]JIANG W X,ZHANG Z X,WU J J.Reversible digital water-marking-based protocol for data integrity in wireless sensor network[J].Journal of Communication,2018,39(3):118-127.
[30]QING L,ZHU Q X,WANG M W.Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks[J].Computer Communications,2006,29(12):2230-2237.
[1] LU Xingyuan, CHEN Jingwei, FENG Yong, WU Wenyuan. Privacy-preserving Data Classification Protocol Based on Homomorphic Encryption [J]. Computer Science, 2023, 50(8): 321-332.
[2] ZHAO Min, TIAN Youliang, XIONG Jinbo, BI Renwan, XIE Hongtao. Neural Network Model Training Method Based on Homomorphic Encryption [J]. Computer Science, 2023, 50(5): 372-381.
[3] Yifei ZOU, Senmao QI, Cong'an XU, Dongxiao YU. Distributed Weighted Data Aggregation Algorithm in End-to-Edge Communication Networks Based on Multi-armed Bandit [J]. Computer Science, 2023, 50(2): 13-22.
[4] LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325.
[5] QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346.
[6] REN Hua, NIU Shao-zhang, WANG Mao-sen, YUE Zhen, REN Ru-yong. Homomorphic and Commutative Fragile Zero-watermarking Based on SVD [J]. Computer Science, 2022, 49(3): 70-76.
[7] LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345.
[8] YANG Hong-jian, HU Xue-xian, LI Ke-jia, XU Yang, WEI Jiang-hong. Study on Privacy-preserving Nonlinear Federated Support Vector Machines [J]. Computer Science, 2022, 49(12): 22-32.
[9] GUO Yan-qing, LI Yu-hang, WANG Wan-wan, FU Hai-yan, WU Ming-kan, LI Yi. FL-GRM:Gamma Regression Algorithm Based on Federated Learning [J]. Computer Science, 2022, 49(12): 66-73.
[10] ZHU Zong-wu, HUANG Ru-wei. Secure Multi-party Computing Protocol Based on Efficient Fully Homomorphic Encryption [J]. Computer Science, 2022, 49(11): 345-350.
[11] ZHOU Qian, DAI Hua, SHENG Wen-jie, HU Zheng, YANG Geng. Research on Verifiable Keyword Search over Encrypted Cloud Data:A Survey [J]. Computer Science, 2022, 49(10): 272-278.
[12] ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie. Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment [J]. Computer Science, 2021, 48(9): 324-329.
[13] ZHOU Yi-hua, JIA Yu-xin, JIA Li-yuan, FANG Jia-bo, SHI Wei-min. Data Integrity Verification Scheme of Shared EMR Based on Red Black Tree [J]. Computer Science, 2021, 48(9): 330-336.
[14] WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551.
[15] XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!