A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications
Authors
Keywords
-
Journal
SENSORS
Volume 18, Issue 12, Pages 4346
Publisher
MDPI AG
Online
2018-12-10
DOI
10.3390/s18124346
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
- (2018) Khizar Hameed et al. Future Generation Computer Systems-The International Journal of eScience
- IoT security: Review, blockchain solutions, and open challenges
- (2018) Minhaj Ahmad Khan et al. Future Generation Computer Systems-The International Journal of eScience
- The application of internet of things in healthcare: a systematic literature review and classification
- (2018) Hossein Ahmadi et al. Universal Access in the Information Society
- Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks
- (2017) Jie Cui et al. Peer-to-Peer Networking and Applications
- Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints
- (2016) Anas Bushnag et al. SENSORS
- Detecting Malicious Data Injections in Wireless Sensor Networks
- (2015) Vittorio P. Illiano et al. ACM COMPUTING SURVEYS
- A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs
- (2015) Djallel Eddine Boubiche et al. IEEE COMMUNICATIONS LETTERS
- A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems
- (2015) Xinyu Yang et al. IEEE TRANSACTIONS ON COMPUTERS
- IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks
- (2015) Tzonelih Hwang et al. WIRELESS PERSONAL COMMUNICATIONS
- Secure data aggregation in wireless sensor networks using homomorphic encryption
- (2014) Manish Kumar et al. INTERNATIONAL JOURNAL OF ELECTRONICS
- Internet of Things (IoT): A vision, architectural elements, and future directions
- (2013) Jayavardhana Gubbi et al. Future Generation Computer Systems-The International Journal of eScience
- A reversible watermarking authentication scheme for wireless sensor networks
- (2013) Xi Shi et al. INFORMATION SCIENCES
- On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas
- (2013) Hong-Ning Dai et al. International Journal of Distributed Sensor Networks
- Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks
- (2012) Bo Sun et al. IEEE Systems Journal
- Efficient and provably secure aggregation of encrypted data in wireless sensor networks
- (2009) Claude Castelluccia et al. ACM Transactions on Sensor Networks
- Confidentiality and integrity for data aggregation in WSN using peer monitoring
- (2009) Roberto Di Pietro et al. Security and Communication Networks
- LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
- (2008) Kui Ren et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now