{"title":"基于聚类和感知值的目标改进数字水印方法","authors":"P. Shonazarov, F. T. Kholov, Bekhruz B. Saidov","doi":"10.17212/2782-2001-2022-1-109-120","DOIUrl":null,"url":null,"abstract":"One of the most important IoT concerns is resource constraints such as power supply, processing power, memory capacity, wireless range, and wireless bandwidth. Low bandwidth wireless routing requires multiple routing steps to reach a destination. The Internet of things (Internet of things, IoT) is a technology that consists of a set of objects that are connected via the Internet and collect information generated by sensors. IoT devices are devices that are networked and accessible to anyone and everything anytime and anywhere. Examples of such devices include temperature sensors, motion sensors, heart rate sensors, energy consumption sensors, etc. For example, a temperature sensor can be built into a thermostat, an indicator of the amount of electricity consumed in homes, and a traffic sensor at a traffic light. This article proposes a scheme based on fragile watermarking and improved clustering to resolve the conflict between security and limited perceptual resources. To improve security, we are developing a stochastic positioning strategy based on a clustering algorithm to compute the position embedded in the temporal dynamics of the data measurement. Thus, security vulnerabilities created by a stationary embedded situation can not only be effectively addressed but also result in zero data disturbance. Our research results show that the proposed algorithm can effectively integrate low-cost data, as well as reduce power consumption and increase network life.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The method of digital watermarking for improving objects based on clusters and perception values\",\"authors\":\"P. Shonazarov, F. T. Kholov, Bekhruz B. Saidov\",\"doi\":\"10.17212/2782-2001-2022-1-109-120\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most important IoT concerns is resource constraints such as power supply, processing power, memory capacity, wireless range, and wireless bandwidth. Low bandwidth wireless routing requires multiple routing steps to reach a destination. The Internet of things (Internet of things, IoT) is a technology that consists of a set of objects that are connected via the Internet and collect information generated by sensors. IoT devices are devices that are networked and accessible to anyone and everything anytime and anywhere. Examples of such devices include temperature sensors, motion sensors, heart rate sensors, energy consumption sensors, etc. For example, a temperature sensor can be built into a thermostat, an indicator of the amount of electricity consumed in homes, and a traffic sensor at a traffic light. This article proposes a scheme based on fragile watermarking and improved clustering to resolve the conflict between security and limited perceptual resources. To improve security, we are developing a stochastic positioning strategy based on a clustering algorithm to compute the position embedded in the temporal dynamics of the data measurement. Thus, security vulnerabilities created by a stationary embedded situation can not only be effectively addressed but also result in zero data disturbance. Our research results show that the proposed algorithm can effectively integrate low-cost data, as well as reduce power consumption and increase network life.\",\"PeriodicalId\":292298,\"journal\":{\"name\":\"Analysis and data processing systems\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Analysis and data processing systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17212/2782-2001-2022-1-109-120\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Analysis and data processing systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17212/2782-2001-2022-1-109-120","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
物联网最重要的问题之一是资源限制,如电源、处理能力、内存容量、无线范围和无线带宽。低带宽无线路由需要多个路由步骤才能到达目的地。物联网(Internet of things, IoT)是一种技术,它由一组通过互联网连接起来的物体组成,并收集传感器产生的信息。物联网设备是联网的设备,任何人、任何东西都可以随时随地访问。这种装置的例子包括温度传感器、运动传感器、心率传感器、能耗传感器等。例如,可以在恒温器中安装温度传感器,在家庭中安装电量指示器,在交通灯中安装交通传感器。本文提出了一种基于脆弱水印和改进聚类的方案来解决安全性与有限感知资源之间的冲突。为了提高安全性,我们正在开发一种基于聚类算法的随机定位策略,以计算嵌入在数据测量时间动态中的位置。这样,既可以有效地解决固定嵌入式环境产生的安全漏洞,又可以实现零数据干扰。研究结果表明,该算法可以有效地集成低成本数据,降低功耗,提高网络寿命。
The method of digital watermarking for improving objects based on clusters and perception values
One of the most important IoT concerns is resource constraints such as power supply, processing power, memory capacity, wireless range, and wireless bandwidth. Low bandwidth wireless routing requires multiple routing steps to reach a destination. The Internet of things (Internet of things, IoT) is a technology that consists of a set of objects that are connected via the Internet and collect information generated by sensors. IoT devices are devices that are networked and accessible to anyone and everything anytime and anywhere. Examples of such devices include temperature sensors, motion sensors, heart rate sensors, energy consumption sensors, etc. For example, a temperature sensor can be built into a thermostat, an indicator of the amount of electricity consumed in homes, and a traffic sensor at a traffic light. This article proposes a scheme based on fragile watermarking and improved clustering to resolve the conflict between security and limited perceptual resources. To improve security, we are developing a stochastic positioning strategy based on a clustering algorithm to compute the position embedded in the temporal dynamics of the data measurement. Thus, security vulnerabilities created by a stationary embedded situation can not only be effectively addressed but also result in zero data disturbance. Our research results show that the proposed algorithm can effectively integrate low-cost data, as well as reduce power consumption and increase network life.