Ad Hoc Networks. 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers

Research Article

On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security

Download278 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-13329-4_5,
        author={Rola Al-Sharif and Christophe Guyeux and Yousra Fadil and Abdallah Makhoul and Ali Jaber},
        title={On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security},
        proceedings={Ad Hoc Networks. 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers},
        proceedings_a={ADHOCNETS},
        year={2014},
        month={11},
        keywords={Information hiding Steganography Steganalysis Wireless sensor networks Security},
        doi={10.1007/978-3-319-13329-4_5}
    }
    
  • Rola Al-Sharif
    Christophe Guyeux
    Yousra Fadil
    Abdallah Makhoul
    Ali Jaber
    Year: 2014
    On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security
    ADHOCNETS
    Springer
    DOI: 10.1007/978-3-319-13329-4_5
Rola Al-Sharif1,*, Christophe Guyeux2,*, Yousra Fadil,*, Abdallah Makhoul2,*, Ali Jaber1,*
  • 1: Universite Libanaise
  • 2: Universite de Franche-Comte
*Contact email: rola.alcharif@gmail.com, christophe.guyeux@univ-fcomte.fr, yousra_ahmed.fadil@univ-fcomte.fr, abdallah.makhoul@univ-fcomte.fr, ali.jaber@ul.edu.lb

Abstract

A wireless sensor network (WSN) typically consists of base stations and a large number of wireless sensors. The sensory data gathered from the whole network at a certain time snapshot can be visualized as an image. As a result, information hiding techniques can be applied to this “sensory data image”. Steganography refers to the technology of hiding data into digital media without drawing any suspicion, while steganalysis is the art of detecting the presence of steganography. This article provides a brief review of steganography and steganalysis applications for wireless sensor networks (WSNs). Then we show that the steganographic techniques are both related to sensed data authentication in wireless sensor networks, and when considering the attacker point of view, which has not yet been investigated in the literature. Our simulation results show that the sink level is unable to detect an attack carried out by the nsF5 algorithm on sensed data.