Securing IoT Data Using Steganography: A Practical Implementation Approach

Adding network connectivity to any “thing” can certainly provide great value, but it also brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” system’s capabilities, the validity and accuracy of transmitted data should be ensured. Due to the constrained envi...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autor principal: Fatiha Djebbar
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
Acceso en línea:https://doaj.org/article/7e7f437d48d64b2e9db47c65bb77c920
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:7e7f437d48d64b2e9db47c65bb77c920
record_format dspace
spelling oai:doaj.org-article:7e7f437d48d64b2e9db47c65bb77c9202021-11-11T15:42:05ZSecuring IoT Data Using Steganography: A Practical Implementation Approach10.3390/electronics102127072079-9292https://doaj.org/article/7e7f437d48d64b2e9db47c65bb77c9202021-11-01T00:00:00Zhttps://www.mdpi.com/2079-9292/10/21/2707https://doaj.org/toc/2079-9292Adding network connectivity to any “thing” can certainly provide great value, but it also brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” system’s capabilities, the validity and accuracy of transmitted data should be ensured. Due to the constrained environment of IoT devices, practical security implementation presents a great challenge. In this paper, we present a noise-resilient, low-overhead, lightweight steganography solution adequate for use in the IoT environment. The accuracy of hidden data is tested against corruption using multiple modulations and coding schemes (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>M</mi><mi>C</mi><mi>S</mi><mi>s</mi></mrow></semantics></math></inline-formula>). Additive white Gaussian noise (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>A</mi><mi>W</mi><mi>G</mi><mi>N</mi></mrow></semantics></math></inline-formula>) is added to the modulated data to simulate the noisy channel as well as several wireless technologies such as cellular, WiFi, and vehicular communications that are used between communicating IoT devices. The presented scheme is capable of hiding a high payload in audio signals (e.g., speech and music) with a low bit error rate (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>B</mi><mi>E</mi><mi>R</mi></mrow></semantics></math></inline-formula>), high undetectability, low complexity, and low perceptibility. The proposed algorithm is evaluated using well-established performance evaluation techniques and has been demonstrated to be a practical candidate for the mass deployment of IoT devices.Fatiha DjebbarMDPI AGarticleIoT cybersecuritydata protectionsignal modulationinformation hidingdigital audioaudio steganographyElectronicsTK7800-8360ENElectronics, Vol 10, Iss 2707, p 2707 (2021)
institution DOAJ
collection DOAJ
language EN
topic IoT cybersecurity
data protection
signal modulation
information hiding
digital audio
audio steganography
Electronics
TK7800-8360
spellingShingle IoT cybersecurity
data protection
signal modulation
information hiding
digital audio
audio steganography
Electronics
TK7800-8360
Fatiha Djebbar
Securing IoT Data Using Steganography: A Practical Implementation Approach
description Adding network connectivity to any “thing” can certainly provide great value, but it also brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” system’s capabilities, the validity and accuracy of transmitted data should be ensured. Due to the constrained environment of IoT devices, practical security implementation presents a great challenge. In this paper, we present a noise-resilient, low-overhead, lightweight steganography solution adequate for use in the IoT environment. The accuracy of hidden data is tested against corruption using multiple modulations and coding schemes (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>M</mi><mi>C</mi><mi>S</mi><mi>s</mi></mrow></semantics></math></inline-formula>). Additive white Gaussian noise (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>A</mi><mi>W</mi><mi>G</mi><mi>N</mi></mrow></semantics></math></inline-formula>) is added to the modulated data to simulate the noisy channel as well as several wireless technologies such as cellular, WiFi, and vehicular communications that are used between communicating IoT devices. The presented scheme is capable of hiding a high payload in audio signals (e.g., speech and music) with a low bit error rate (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>B</mi><mi>E</mi><mi>R</mi></mrow></semantics></math></inline-formula>), high undetectability, low complexity, and low perceptibility. The proposed algorithm is evaluated using well-established performance evaluation techniques and has been demonstrated to be a practical candidate for the mass deployment of IoT devices.
format article
author Fatiha Djebbar
author_facet Fatiha Djebbar
author_sort Fatiha Djebbar
title Securing IoT Data Using Steganography: A Practical Implementation Approach
title_short Securing IoT Data Using Steganography: A Practical Implementation Approach
title_full Securing IoT Data Using Steganography: A Practical Implementation Approach
title_fullStr Securing IoT Data Using Steganography: A Practical Implementation Approach
title_full_unstemmed Securing IoT Data Using Steganography: A Practical Implementation Approach
title_sort securing iot data using steganography: a practical implementation approach
publisher MDPI AG
publishDate 2021
url https://doaj.org/article/7e7f437d48d64b2e9db47c65bb77c920
work_keys_str_mv AT fatihadjebbar securingiotdatausingsteganographyapracticalimplementationapproach
_version_ 1718434094981840896