ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

被引:0
|
作者
Faraj, Omair [1 ,2 ]
Megias, David [1 ]
Garcia-Alfaro, Joaquin [2 ]
机构
[1] Univ Oberta Catalunya UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona 08018, Spain
[2] Inst Polytech Paris, Telecom SudParis, SAMOVAR, F-91120 Palaiseau, France
关键词
Data integrity; Data provenance; Internet of Things; Intrusion detection; Cybersecurity; Cryptography; Zero-watermarking; INTERNET; SCHEME; THINGS; PROTECTION;
D O I
10.1016/j.jisa.2024.103840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is integrating the Internet and smart devices in almost every domain, such as home automation, e-healthcare systems, vehicular networks, industrial control, and military applications. In these areas, sensory data, which is collected from multiple sources and managed through intermediate processing by multiple nodes, is used for decision-making processes. Ensuring data integrity and keeping track of data provenance are core requirements in such a highly dynamic context, since data provenance is an important tool for the assurance of data trustworthiness. Dealing with such requirements is challenging due to the limited computational and energy resources in IoT networks. This requires addressing several challenges such as processing overhead, secure provenance, bandwidth consumption and storage efficiency. In this paper, we propose Zero-watermarkIng based data pRovenanCe for iOt Networks (ZIRCON), a novel zero-watermarking approach to securely transmit provenance and ensure data integrity of sensor data in an IoT network. In ZIRCON, provenance information is stored in a tamper-proof network database through watermarks, generated at the source node before transmission. We provide an extensive security analysis showing the resilience of our scheme against passive and active attacks. We also compare our scheme with existing works based on performance metrics such as computational time, energy usage, and cost analysis. The results show that ZIRCON is robust against several attacks, lightweight, storage-efficient, and better in energy usage and bandwidth consumption, compared to prior art.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance
    Faraj, Omair
    Megias, David
    Garcia-Alfaro, Joaquin
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [2] BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments
    Javaid, Uzair
    Aman, Muhammad Naveed
    Sikdar, Biplab
    BLOCKSYS'18: PROCEEDINGS OF THE 1ST BLOCKCHAIN-ENABLED NETWORKED SENSOR SYSTEMS, 2018, : 13 - 18
  • [3] Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
    Hameed, Khizar
    Khan, Abid
    Ahmed, Mansoor
    Reddy, Alavalapati Goutham
    Rathore, M. Mazhar
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 274 - 289
  • [4] A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature
    Zhu, Hongliang
    Yuan, Ting
    Chen, Yuling
    Zha, Taxing
    Xi, Wanting
    Jia, Bin
    Xin, Yang
    IEEE ACCESS, 2019, 7 : 90036 - 90044
  • [5] Secure and Efficient Distributed Network Provenance for IoT: A Blockchain-Based Approach
    Liu, Dongxiao
    Ni, Jianbing
    Huang, Cheng
    Lin, Xiaodong
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) : 7564 - 7574
  • [6] A Secure IoT Data Integrity Auditing Scheme Based on Consortium Blockchain
    Dong, Guofang
    Wang, Xia
    2020 5TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (IEEE ICBDA 2020), 2020, : 246 - 250
  • [7] Blockchain-based cryptographic approach for privacy enabled data integrity model for IoT healthcare
    Chandol, Mohan Kumar
    Rao, M. Kameswara
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2025, 37 (01) : 53 - 74
  • [8] Blockchain-based authentication and secure communication in IoT networks
    Lau, Chi Ho
    Yeung, Kai Hau
    Yan, Fan
    Chan, Sammy
    SECURITY AND PRIVACY, 2023, 6 (06)
  • [9] BSTProv: Blockchain-Based Secure and Trustworthy Data Provenance Sharing
    Sun, Lian-Shan
    Bai, Xue
    Zhang, Chao
    Li, Yang
    Zhang, Yong-Bin
    Guo, Wen-Qiang
    ELECTRONICS, 2022, 11 (09)
  • [10] A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
    Lapmoon, Jakkarin
    Fugkeaw, Somchart
    IEEE ACCESS, 2025, 13 : 11969 - 11988