Skip to main content

On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security

  • Conference paper
  • First Online:
Ad Hoc Networks (ADHOCNETS 2015)

Abstract

A wireless sensor network (WSN) typically consists of base stations and a large number of wireless sensors. The sensory data gathered from the whole network at a certain time snapshot can be visualized as an image. As a result, information hiding techniques can be applied to this “sensory data image”. Steganography refers to the technology of hiding data into digital media without drawing any suspicion, while steganalysis is the art of detecting the presence of steganography. This article provides a brief review of steganography and steganalysis applications for wireless sensor networks (WSNs). Then we show that the steganographic techniques are both related to sensed data authentication in wireless sensor networks, and when considering the attacker point of view, which has not yet been investigated in the literature. Our simulation results show that the sink level is unable to detect an attack carried out by the nsF5 algorithm on sensed data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hiding, I.: Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers, Norwell, MA, USA (2001)

    Google Scholar 

  2. Bahi, J., Couchot, J.-F., Guyeux, C.: Steganography: a class of secure and robust algorithms. The Computer Journal 55(6), 653–666 (2012)

    Article  Google Scholar 

  3. Bahi, J., Guyeux, C., Makhoul, A., Pham, C.: Low cost monitoring and intruders detection using wireless video sensor networks. International Journal of Distributed Sensor Networks, 11 p. (2012)

    Google Scholar 

  4. Chanu, Y.J., Singh, K.M., Tuithung, T.: Image steganography and steganalysis: A survey. International Journal of Computer Applications, Published by Foundation of Computer Science 52(2), 1–11 (2012)

    Google Scholar 

  5. Chanu, Y.J., Tuithung, T., Singh, K.M.: A short survey on image steganography and steganalysis techniques. In: 2012 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS) pp. 52–55 (2012)

    Google Scholar 

  6. Farid, H.: Detecting steganographic messages in digital images. Technical report, Hanover, NH, USA (2001)

    Google Scholar 

  7. Fridrich, J., Long, M.: Steganalysis of lsb encoding in color images. In: 2000 IEEE International Conference on Multimedia and Expo ICME 2000, vol. 3, pp. 1279–1282 (2000)

    Google Scholar 

  8. Fridrich, J., Goljan, M.: Practical steganalysis of digital images - state of the art. In: Proceedings of SPIE, pp. 1–13 (2002)

    Google Scholar 

  9. Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable jpeg steganography: Dead ends challenges, and opportunities. In: Proceedings of the 9th Workshop on Multimedia & Security, MMSec 2007, pp. 3–14. ACM, New York (2007)

    Google Scholar 

  10. Gul, G., Kurugollu, F.: A new methodology in steganalysis: breaking highly undetectable steganograpy (hugo). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 71–84. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2), 432–444 (2012)

    Article  Google Scholar 

  12. Kodovský, J., Fridrich, J.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, MMSec 2009, pp. 63–74. ACM, New York (2009)

    Google Scholar 

  13. Morkel, T., Eloff, J.H.P., Olivier, M.S.: An overview of image steganography. In: Labuschagne, L., Venter, H.S., Eloff, J.H.P., Eloff, M.M. (eds.) Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, Published electronically (2005)

    Google Scholar 

  14. Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th Conference on USENIX Security Symposium - Vol. 10, SSYM 2001, pp. 24–24, Berkeley. USENIX Association (2001)

    Google Scholar 

  15. Westfeld, A.: Lecture Notes in Computer Science. In: Moskowitz, I.S. (ed.) F5a steganographic algorithm. Information Hiding, pp. 289–302. Springer, Berlin Heidelberg (2001)

    Google Scholar 

  16. Pfitzmann, A. (ed.): IH 1999. LNCS, vol. 1768. Springer, Heidelberg (2000)

    Google Scholar 

  17. Zhang, W., Liu, Y., Das, S.K., De, P.: Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach. Pervasive Mob. Comput. 4(5), 658–680 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christophe Guyeux .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Al-Sharif, R., Guyeux, C., Fadil, Y.A., Makhoul, A., Jaber, A. (2014). On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security. In: Mitton, N., Gallais, A., Kantarci, M., Papavassiliou, S. (eds) Ad Hoc Networks. ADHOCNETS 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 140. Springer, Cham. https://doi.org/10.1007/978-3-319-13329-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13329-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13328-7

  • Online ISBN: 978-3-319-13329-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics