{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T18:53:10Z","timestamp":1772650390005,"version":"3.50.1"},"reference-count":29,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T00:00:00Z","timestamp":1302134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Limited energy is the most critical constraint that limits the capabilities of wireless sensor networks (WSNs). Most sensors operate on batteries with limited power. Battery recharging or replacement may be impossible. Security mechanisms that are based on public key cryptographic algorithms such as RSA and digital signatures are prohibitively expensive in terms of energy consumption and storage requirements, and thus unsuitable for WSN applications. This paper proposes a new fragile watermarking technique to detect unauthorized alterations in WSN data streams. We propose the FWC-D scheme, which uses group delimiters to keep the sender and receivers synchronized and help them to avoid ambiguity in the event of data insertion or deletion. The watermark, which is computed using a hash function, is stored in the previous group in a linked-list fashion to ensure data freshness and mitigate replay attacks, FWC-D generates a serial number SN that is attached to each group to help the receiver determines how many group insertions or deletions occurred. Detailed security analysis that compares the proposed FWC-D scheme with SGW, one of the latest integrity schemes for WSNs, shows that FWC-D is more robust than SGW. Simulation results further show that the proposed scheme is much faster than SGW.<\/jats:p>","DOI":"10.3390\/s110404118","type":"journal-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T12:04:04Z","timestamp":1302177844000},"page":"4118-4136","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["A Lightweight Data Integrity Scheme for Sensor Networks"],"prefix":"10.3390","volume":"11","author":[{"given":"Ibrahim","family":"Kamel","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Sharjah, P.O. Box 2727, Sharjah, UAE"}]},{"given":"Hussam","family":"Juma","sequence":"additional","affiliation":[{"name":"Dubai World, P.O. Box 4399, Dubai, UAE"}]}],"member":"1968","published-online":{"date-parts":[[2011,4,7]]},"reference":[{"key":"ref_1","unstructured":"Pathan, ASK, Hyung, L, and Hong, CS (, January February). Security in Wireless Sensor Networks: Issues and Challenges. Phoenix Park, Korea."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"69","DOI":"10.3233\/JCS-2007-15104","article-title":"SIA: Secure Information Aggregation in Sensor Networks","volume":"15","author":"Perrig","year":"2007","journal-title":"J. Comput. Secur"},{"key":"ref_3","first-page":"151","article-title":"Security Mechanisms for Wireless Sensor Networks","volume":"6","author":"Ren","year":"2006","journal-title":"Int. J. Comput. Sci. Netw. Secur"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1080\/15501320590966459","article-title":"Data Integrity Protocol for Sensor Networks","volume":"1","author":"Durresi","year":"2005","journal-title":"Int. J. Distrib. Sens. Netw"},{"key":"ref_5","unstructured":"Venugopalan, R, Ganesan, P, Peddabachagari, P, Dean, A, Mueller, F, and Sichitiu, M (, January October). Encryption Overhead in Embedded Systems and Sensor Network Nodes: Modeling and Analysis. San Jose, CA, USA."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1109\/5.771066","article-title":"Multimedia Watermarking Techniques","volume":"87","author":"Hartung","year":"1999","journal-title":"Proc. IEEE"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1109\/5.771077","article-title":"Copy Protection for DVD Video","volume":"87","author":"Bloom","year":"1999","journal-title":"Proc. IEEE"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TIFS.2005.863505","article-title":"Analysis and Design of Secure Watermark-Based Authentication Systems","volume":"1","author":"Chuhong","year":"2006","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"ref_9","unstructured":"Chen, M, He, Y, and Lagendijk, RL (, January April). Error Detection by Fragile Watermarking. Seoul, Korea."},{"key":"ref_10","first-page":"315","article-title":"A fragile Watermark Error Detection Scheme for Wireless Video Communications","volume":"7","author":"Chen","year":"2005","journal-title":"IEEE Trans. Multimedia"},{"key":"ref_11","first-page":"41","article-title":"Watermarking Security: A Survey. LNCS","volume":"1","author":"Luis","year":"2006","journal-title":"Trans. Data Hiding Multimedia Secur"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.ins.2006.03.014","article-title":"Chaining Watermarks for Detecting Malicious Modifications to Streaming Data","volume":"177","author":"Guo","year":"2007","journal-title":"Inf. Sci"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.adhoc.2003.09.009","article-title":"Security Considerations in Ad Hoc Sensor Networks","volume":"3","author":"Hu","year":"2005","journal-title":"Ad Hoc Netw. J"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MWC.2004.1368895","article-title":"Designing Secure Sensor Networks","volume":"11","author":"Shi","year":"2004","journal-title":"IEEE Wirel. Commun. J"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2006.315852","article-title":"A Survey of Security Issues in Wireless Sensor Networks","volume":"8","author":"Wang","year":"2006","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Xiao, Y (2006). Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications-CRC Press. Chapter 17.","DOI":"10.1201\/9780849379253"},{"key":"ref_17","unstructured":"Zia, T, and Zomaya, A (, January February). A Security Framework for Wireless Sensor Networks. Houston, TX, USA."},{"key":"ref_18","unstructured":"Perrig, A, Szewczyk, R, Wen, V, Culler, D, and Tygar, JD (, January July). SPINS: Security Protocols for Sensor Networks. Rome, Italy."},{"key":"ref_19","unstructured":"Karlof, C, Sastry, N, and Wagner, D (, January November). TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Baltimore, MD, USA."},{"key":"ref_20","unstructured":"Zhu, S, Setia, S, and Jajodia, S (, January October). LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. Washington, DC, USA."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.cose.2009.01.007","article-title":"Watermarking R-trees for Copyright Protection","volume":"28","author":"Kamel","year":"2009","journal-title":"Int. J. Comput. Secur"},{"key":"ref_22","unstructured":"Sion, R, Atallah, M, and Prabhakar, S (, January September). Resilient Rights Protection for Sensor Streams. Toronto, Canada."},{"key":"ref_23","unstructured":"Perrig, A, Canetti, R, Song, D, and Tygar, JD (, January May). Efficient Authentication and Signing of Multicast Streams Over Lossy Channels. Oakland, CA, USA."},{"key":"ref_24","unstructured":"Albath, J, and Madria, S (, January June). Practical Algorithm for Data Security (PADS) in Wireless Sensor Networks. Beijing, China."},{"key":"ref_25","first-page":"101","article-title":"Simplified Watermarking Scheme for Sensor Networks","volume":"5","author":"Kamel","year":"2010","journal-title":"Int. J. Internet Protoc. Technol. Indersci"},{"key":"ref_26","unstructured":"Agrawal, R, Haas, PJ, and Kiernan, J (, January August). Watermarking Relational Data: Framework, Algorithms, and Analysis. Hong Kong, China."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1350","DOI":"10.1016\/j.ins.2005.06.003","article-title":"A fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations","volume":"177","author":"Guo","year":"2006","journal-title":"J. Informat. Sci"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1016\/j.cose.2009.04.001","article-title":"A Schema for Protecting the Integrity of Databases","volume":"28","author":"Kamel","year":"2009","journal-title":"Int. J. Comput. Secur"},{"key":"ref_29","unstructured":"Gomaa, H, Kamel, I, and Kaya, L (, January August). On Protecting the Integrity of Sensor Data. Malta."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/11\/4\/4118\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:55:46Z","timestamp":1760219746000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/11\/4\/4118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,7]]},"references-count":29,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2011,4]]}},"alternative-id":["s110404118"],"URL":"https:\/\/doi.org\/10.3390\/s110404118","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,7]]}}}