Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things

Internet of things (IoT) has been developed and applied rapidly because of its huge commercial value in recent years. However, security problem has become a key factor restricting the development of IoT. The nodes of IoT are easy to be impersonated or replaced when attacked, which leads to the mista...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Lina Zhang, Tong Wang, Xiangqin Zheng, Junhan Yang, Liping Lv
Formato: article
Lenguaje:EN
Publicado: Hindawi-Wiley 2021
Materias:
Acceso en línea:https://doaj.org/article/8164f1fa62a041f1a7372d256679064d
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:8164f1fa62a041f1a7372d256679064d
record_format dspace
spelling oai:doaj.org-article:8164f1fa62a041f1a7372d256679064d2021-11-22T01:09:45ZSecret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things1939-012210.1155/2021/1721925https://doaj.org/article/8164f1fa62a041f1a7372d256679064d2021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/1721925https://doaj.org/toc/1939-0122Internet of things (IoT) has been developed and applied rapidly because of its huge commercial value in recent years. However, security problem has become a key factor restricting the development of IoT. The nodes of IoT are easy to be impersonated or replaced when attacked, which leads to the mistake of the uploaded data, the abnormal use of the application, and so on. Identifying the authenticity of the data submitted by the nodes is the top priority. We propose a scheme to verify the authenticity of multinode data. In this scheme, the authenticity of node data is checked through visual secret recovery and XOR operation together. The least significant bit (lsb) operation converts data from nodes into a bit, which improves the efficiency of data verification and reduces the risk of data leakage. This scheme achieves the purpose of verifying the data provided by the node, which avoids malicious attacks from illegal nodes. By analyzing the experiment result and comparing with other works, our scheme has the advantages of high verification efficiency, lightweight storage of nodes, and security verification.Lina ZhangTong WangXiangqin ZhengJunhan YangLiping LvHindawi-WileyarticleTechnology (General)T1-995Science (General)Q1-390ENSecurity and Communication Networks, Vol 2021 (2021)
institution DOAJ
collection DOAJ
language EN
topic Technology (General)
T1-995
Science (General)
Q1-390
spellingShingle Technology (General)
T1-995
Science (General)
Q1-390
Lina Zhang
Tong Wang
Xiangqin Zheng
Junhan Yang
Liping Lv
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
description Internet of things (IoT) has been developed and applied rapidly because of its huge commercial value in recent years. However, security problem has become a key factor restricting the development of IoT. The nodes of IoT are easy to be impersonated or replaced when attacked, which leads to the mistake of the uploaded data, the abnormal use of the application, and so on. Identifying the authenticity of the data submitted by the nodes is the top priority. We propose a scheme to verify the authenticity of multinode data. In this scheme, the authenticity of node data is checked through visual secret recovery and XOR operation together. The least significant bit (lsb) operation converts data from nodes into a bit, which improves the efficiency of data verification and reduces the risk of data leakage. This scheme achieves the purpose of verifying the data provided by the node, which avoids malicious attacks from illegal nodes. By analyzing the experiment result and comparing with other works, our scheme has the advantages of high verification efficiency, lightweight storage of nodes, and security verification.
format article
author Lina Zhang
Tong Wang
Xiangqin Zheng
Junhan Yang
Liping Lv
author_facet Lina Zhang
Tong Wang
Xiangqin Zheng
Junhan Yang
Liping Lv
author_sort Lina Zhang
title Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
title_short Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
title_full Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
title_fullStr Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
title_full_unstemmed Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
title_sort secret image-sharing scheme based on multinode authentication in the internet of things
publisher Hindawi-Wiley
publishDate 2021
url https://doaj.org/article/8164f1fa62a041f1a7372d256679064d
work_keys_str_mv AT linazhang secretimagesharingschemebasedonmultinodeauthenticationintheinternetofthings
AT tongwang secretimagesharingschemebasedonmultinodeauthenticationintheinternetofthings
AT xiangqinzheng secretimagesharingschemebasedonmultinodeauthenticationintheinternetofthings
AT junhanyang secretimagesharingschemebasedonmultinodeauthenticationintheinternetofthings
AT lipinglv secretimagesharingschemebasedonmultinodeauthenticationintheinternetofthings
_version_ 1718418409597698048