Securing IoT Data Using Steganography: A Practical Implementation Approach
Adding network connectivity to any “thing” can certainly provide great value, but it also brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” system’s capabilities, the validity and accuracy of transmitted data should be ensured. Due to the constrained envi...
Guardado en:
Autor principal: | |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/7e7f437d48d64b2e9db47c65bb77c920 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:7e7f437d48d64b2e9db47c65bb77c920 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:7e7f437d48d64b2e9db47c65bb77c9202021-11-11T15:42:05ZSecuring IoT Data Using Steganography: A Practical Implementation Approach10.3390/electronics102127072079-9292https://doaj.org/article/7e7f437d48d64b2e9db47c65bb77c9202021-11-01T00:00:00Zhttps://www.mdpi.com/2079-9292/10/21/2707https://doaj.org/toc/2079-9292Adding network connectivity to any “thing” can certainly provide great value, but it also brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” system’s capabilities, the validity and accuracy of transmitted data should be ensured. Due to the constrained environment of IoT devices, practical security implementation presents a great challenge. In this paper, we present a noise-resilient, low-overhead, lightweight steganography solution adequate for use in the IoT environment. The accuracy of hidden data is tested against corruption using multiple modulations and coding schemes (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>M</mi><mi>C</mi><mi>S</mi><mi>s</mi></mrow></semantics></math></inline-formula>). Additive white Gaussian noise (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>A</mi><mi>W</mi><mi>G</mi><mi>N</mi></mrow></semantics></math></inline-formula>) is added to the modulated data to simulate the noisy channel as well as several wireless technologies such as cellular, WiFi, and vehicular communications that are used between communicating IoT devices. The presented scheme is capable of hiding a high payload in audio signals (e.g., speech and music) with a low bit error rate (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>B</mi><mi>E</mi><mi>R</mi></mrow></semantics></math></inline-formula>), high undetectability, low complexity, and low perceptibility. The proposed algorithm is evaluated using well-established performance evaluation techniques and has been demonstrated to be a practical candidate for the mass deployment of IoT devices.Fatiha DjebbarMDPI AGarticleIoT cybersecuritydata protectionsignal modulationinformation hidingdigital audioaudio steganographyElectronicsTK7800-8360ENElectronics, Vol 10, Iss 2707, p 2707 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
IoT cybersecurity data protection signal modulation information hiding digital audio audio steganography Electronics TK7800-8360 |
spellingShingle |
IoT cybersecurity data protection signal modulation information hiding digital audio audio steganography Electronics TK7800-8360 Fatiha Djebbar Securing IoT Data Using Steganography: A Practical Implementation Approach |
description |
Adding network connectivity to any “thing” can certainly provide great value, but it also brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” system’s capabilities, the validity and accuracy of transmitted data should be ensured. Due to the constrained environment of IoT devices, practical security implementation presents a great challenge. In this paper, we present a noise-resilient, low-overhead, lightweight steganography solution adequate for use in the IoT environment. The accuracy of hidden data is tested against corruption using multiple modulations and coding schemes (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>M</mi><mi>C</mi><mi>S</mi><mi>s</mi></mrow></semantics></math></inline-formula>). Additive white Gaussian noise (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>A</mi><mi>W</mi><mi>G</mi><mi>N</mi></mrow></semantics></math></inline-formula>) is added to the modulated data to simulate the noisy channel as well as several wireless technologies such as cellular, WiFi, and vehicular communications that are used between communicating IoT devices. The presented scheme is capable of hiding a high payload in audio signals (e.g., speech and music) with a low bit error rate (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>B</mi><mi>E</mi><mi>R</mi></mrow></semantics></math></inline-formula>), high undetectability, low complexity, and low perceptibility. The proposed algorithm is evaluated using well-established performance evaluation techniques and has been demonstrated to be a practical candidate for the mass deployment of IoT devices. |
format |
article |
author |
Fatiha Djebbar |
author_facet |
Fatiha Djebbar |
author_sort |
Fatiha Djebbar |
title |
Securing IoT Data Using Steganography: A Practical Implementation Approach |
title_short |
Securing IoT Data Using Steganography: A Practical Implementation Approach |
title_full |
Securing IoT Data Using Steganography: A Practical Implementation Approach |
title_fullStr |
Securing IoT Data Using Steganography: A Practical Implementation Approach |
title_full_unstemmed |
Securing IoT Data Using Steganography: A Practical Implementation Approach |
title_sort |
securing iot data using steganography: a practical implementation approach |
publisher |
MDPI AG |
publishDate |
2021 |
url |
https://doaj.org/article/7e7f437d48d64b2e9db47c65bb77c920 |
work_keys_str_mv |
AT fatihadjebbar securingiotdatausingsteganographyapracticalimplementationapproach |
_version_ |
1718434094981840896 |