Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
Internet of things (IoT) has been developed and applied rapidly because of its huge commercial value in recent years. However, security problem has become a key factor restricting the development of IoT. The nodes of IoT are easy to be impersonated or replaced when attacked, which leads to the mista...
Guardado en:
Autores principales: | , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Hindawi-Wiley
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/8164f1fa62a041f1a7372d256679064d |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:8164f1fa62a041f1a7372d256679064d |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:8164f1fa62a041f1a7372d256679064d2021-11-22T01:09:45ZSecret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things1939-012210.1155/2021/1721925https://doaj.org/article/8164f1fa62a041f1a7372d256679064d2021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/1721925https://doaj.org/toc/1939-0122Internet of things (IoT) has been developed and applied rapidly because of its huge commercial value in recent years. However, security problem has become a key factor restricting the development of IoT. The nodes of IoT are easy to be impersonated or replaced when attacked, which leads to the mistake of the uploaded data, the abnormal use of the application, and so on. Identifying the authenticity of the data submitted by the nodes is the top priority. We propose a scheme to verify the authenticity of multinode data. In this scheme, the authenticity of node data is checked through visual secret recovery and XOR operation together. The least significant bit (lsb) operation converts data from nodes into a bit, which improves the efficiency of data verification and reduces the risk of data leakage. This scheme achieves the purpose of verifying the data provided by the node, which avoids malicious attacks from illegal nodes. By analyzing the experiment result and comparing with other works, our scheme has the advantages of high verification efficiency, lightweight storage of nodes, and security verification.Lina ZhangTong WangXiangqin ZhengJunhan YangLiping LvHindawi-WileyarticleTechnology (General)T1-995Science (General)Q1-390ENSecurity and Communication Networks, Vol 2021 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Technology (General) T1-995 Science (General) Q1-390 |
spellingShingle |
Technology (General) T1-995 Science (General) Q1-390 Lina Zhang Tong Wang Xiangqin Zheng Junhan Yang Liping Lv Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things |
description |
Internet of things (IoT) has been developed and applied rapidly because of its huge commercial value in recent years. However, security problem has become a key factor restricting the development of IoT. The nodes of IoT are easy to be impersonated or replaced when attacked, which leads to the mistake of the uploaded data, the abnormal use of the application, and so on. Identifying the authenticity of the data submitted by the nodes is the top priority. We propose a scheme to verify the authenticity of multinode data. In this scheme, the authenticity of node data is checked through visual secret recovery and XOR operation together. The least significant bit (lsb) operation converts data from nodes into a bit, which improves the efficiency of data verification and reduces the risk of data leakage. This scheme achieves the purpose of verifying the data provided by the node, which avoids malicious attacks from illegal nodes. By analyzing the experiment result and comparing with other works, our scheme has the advantages of high verification efficiency, lightweight storage of nodes, and security verification. |
format |
article |
author |
Lina Zhang Tong Wang Xiangqin Zheng Junhan Yang Liping Lv |
author_facet |
Lina Zhang Tong Wang Xiangqin Zheng Junhan Yang Liping Lv |
author_sort |
Lina Zhang |
title |
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things |
title_short |
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things |
title_full |
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things |
title_fullStr |
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things |
title_full_unstemmed |
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things |
title_sort |
secret image-sharing scheme based on multinode authentication in the internet of things |
publisher |
Hindawi-Wiley |
publishDate |
2021 |
url |
https://doaj.org/article/8164f1fa62a041f1a7372d256679064d |
work_keys_str_mv |
AT linazhang secretimagesharingschemebasedonmultinodeauthenticationintheinternetofthings AT tongwang secretimagesharingschemebasedonmultinodeauthenticationintheinternetofthings AT xiangqinzheng secretimagesharingschemebasedonmultinodeauthenticationintheinternetofthings AT junhanyang secretimagesharingschemebasedonmultinodeauthenticationintheinternetofthings AT lipinglv secretimagesharingschemebasedonmultinodeauthenticationintheinternetofthings |
_version_ |
1718418409597698048 |