receivers to determine the group sizes. Second, when
two such groups g
i-1
and g
i
are formed, the group g
i
watermark W is computed using HASH() which is
applied to the concatenation of all individual data
readings in the group. After computing the g
i
watermark, the sender needs to extract the right
number of bits from the watermark W equal to the
number of data elements in group g
i-1
. If the number
of data elements in group g
i-1
is greater than the
length of the computed watermark W, then the
watermark W is concatenated to itself until its size is
equal to the number of data elements in group g
i-1
.
The computed watermark W of group g
i
is then
embedded in group g
i-1
by replacing the least
significant bits of all data elements in group g
i-1
. In
this way, the embedded watermark is chained across
every two groups. So if the whole group is inserted,
the insertion can be easily detected. Once the
watermark is embedded, the group g
i-1
is sent to the
receiver.
3.2 FWC Detection Algorithm
To verify the integrity of the received groups, the
receiver uses the same pseudo-random number
generator along with the secret key K to reproduce
the group size. Then the receiver organizes the
received data into groups similar to those formed by
the sender. We assume that group g
i-1
is formed prior
to group g
i
. Remember that the watermark of group
g
i
is stored in group g
i-1
. Then the watermark of
group g
i
is reconstructed and checked against the
extracted watermark from group g
i-1
. If the two
watermarks match, then group g
i
is designated as
being authentic and the data of group g
i
is accepted.
In the event that the two watermarks do not match,
then the detection algorithm assumes that group g
i
has been altered during the transmission and thus
rejects the data elements of group g
i
.
4 FWC SECURITY ANALYSIS
The attacker’s goal is to make undetectable
modification to the data streams. In this analysis, we
assume that the attacker has only modified one or
more data items of group g
i
as in Figure 3. The first
scenario is in case the attacker only modifies the
least significant bits of group g
i
(Wg
i+1
). At the
receiver end, group g
i
matches the extracted
watermark (Wg
i
) from group g
i-1
. As a result, the
receiver will accept group g
i
. Since the attacker
alters Wg
i+1
, group g
i+1
will not match Wg
i+1
. Thus,
the receiver will consider g
i+1
as not authentic and
will reject it.
Figure 3: FWC data modification attack.
In the second scenario, we look at the possibility
that the attacker modifies the data of group g
i
while
not modifying the least significant bits of group g
i
.
This is shown in Figure 4.7. In this situation the
receiver will reject group g
i
. Since the attacker does
not change Wg
i+1
, group g
i+1
ends up matching
Wg
i+1
. Thus, the receiver will consider g
i+1
as
authentic.
In the third scenario, the attacker changes both
the data and the least significant bits of group g
i
(Wg
i+1
). As a result, the integrity check of groups g
i
and g
i+1
will fail and the receiver will therefore
reject both groups.
As a result of the current group modification
attack, the receiver will drop the current group or the
next group, or even both groups. FWC offers
significant performance advantages over the SGW
Section 5 shows simulation experiments that
compare FWC and SGW. WSNs usually have
limited computing and battery power, so it is
desirable to reduce the number of calculations.
Although FWC offers performance improvement
and watermark construction simplification over
SGW, it nonetheless suffers from the weaknesses of
SGW in the event of insertion and deletion attacks.
5 PERFORMANCE
EVALUATION
We performed experiments to measure the
performance and the overhead of applying the
proposed watermarking scheme. The experimental
results of the proposed FWC scheme are compared
with the SGW scheme.
Figure 4 shows the average
embedding response time (Y) as a function of the
average window size (X). The figure shows that on
average SGW is about 73 times slower than the time
required by FWC. Hence FWC significantly
improves WSN response time, by more than one
order of magnitude.
Figure 5 shows the average extraction and
integrity check response time (Y) as a function of
the average window size (X). The figure shows that
SECURE DELIVERY OF DATA IN WSN
85