{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:54:51Z","timestamp":1725911691131},"reference-count":17,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61501132","61370084","2016M591515","LBH-Z14055","2016RAQXJ063","2016RAXXJ013"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"Since its introduction, IoT (Internet of Things) has enjoyed vigorous support from governments and research institutions around the world, and remarkable achievements have been obtained. The perception layer of IoT plays an important role as a link between the IoT and the real world; the security has become a bottleneck restricting the further development of IoT. The perception layer is a self-organizing network system consisting of various resource-constrained sensor nodes through wireless communication. Accordingly, the costly encryption mechanism cannot be applied to the perception layer. In this paper, a novel lightweight data integrity protection scheme based on fragile watermark is proposed to solve the contradiction between the security and restricted resource of perception layer. To improve the security, we design a position random watermark (PRW) strategy to calculate the embedding position by temporal dynamics of sensing data. The digital watermark is generated by one-way hash function SHA-1 before embedding to the dynamic computed position. In this way, the security vulnerabilities introduced by fixed embedding position can not only be solved effectively, but also achieve zero disturbance to the data. The security analysis and simulation results show that the proposed scheme can effectively ensure the integrity of the data at low cost.<\/jats:p>","DOI":"10.1155\/2017\/3126010","type":"journal-article","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T23:30:47Z","timestamp":1509406247000},"page":"1-12","source":"Crossref","is-referenced-by-count":37,"title":["A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT"],"prefix":"10.1155","volume":"2017","author":[{"given":"Guoyin","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Harbin Engineering University, Heilongjiang, Harbin, China"}]},{"given":"Liang","family":"Kou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Engineering University, Heilongjiang, Harbin, China"}]},{"given":"Liguo","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Engineering University, Heilongjiang, Harbin, China"}]},{"given":"Chao","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Qingan","family":"Da","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Engineering University, Heilongjiang, Harbin, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6656-2191","authenticated-orcid":true,"given":"Jianguo","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Engineering University, Heilongjiang, Harbin, China"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.5120\/15764-4454"},{"issue":"3","key":"8","first-page":"155","volume":"6","year":"2006","journal-title":"Journal of Computer Science and Network Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-0047-0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863505"},{"key":"12","year":"2007"},{"key":"13","year":"2006"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2720635"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2494017"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.03.014"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1504\/IJIPT.2010.032619"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.3390\/s110404118"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.03.031"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2011.833.840"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2013.7.5.37"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.04.010"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/3126010.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/3126010.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/3126010.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T23:30:53Z","timestamp":1509406253000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/3126010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":17,"alternative-id":["3126010","3126010"],"URL":"https:\/\/doi.org\/10.1155\/2017\/3126010","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}