ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

被引:0
|
作者
Faraj, Omair [1 ,2 ]
Megias, David [1 ]
Garcia-Alfaro, Joaquin [2 ]
机构
[1] Univ Oberta Catalunya UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona 08018, Spain
[2] Inst Polytech Paris, Telecom SudParis, SAMOVAR, F-91120 Palaiseau, France
关键词
Data integrity; Data provenance; Internet of Things; Intrusion detection; Cybersecurity; Cryptography; Zero-watermarking; INTERNET; SCHEME; THINGS; PROTECTION;
D O I
10.1016/j.jisa.2024.103840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is integrating the Internet and smart devices in almost every domain, such as home automation, e-healthcare systems, vehicular networks, industrial control, and military applications. In these areas, sensory data, which is collected from multiple sources and managed through intermediate processing by multiple nodes, is used for decision-making processes. Ensuring data integrity and keeping track of data provenance are core requirements in such a highly dynamic context, since data provenance is an important tool for the assurance of data trustworthiness. Dealing with such requirements is challenging due to the limited computational and energy resources in IoT networks. This requires addressing several challenges such as processing overhead, secure provenance, bandwidth consumption and storage efficiency. In this paper, we propose Zero-watermarkIng based data pRovenanCe for iOt Networks (ZIRCON), a novel zero-watermarking approach to securely transmit provenance and ensure data integrity of sensor data in an IoT network. In ZIRCON, provenance information is stored in a tamper-proof network database through watermarks, generated at the source node before transmission. We provide an extensive security analysis showing the resilience of our scheme against passive and active attacks. We also compare our scheme with existing works based on performance metrics such as computational time, energy usage, and cost analysis. The results show that ZIRCON is robust against several attacks, lightweight, storage-efficient, and better in energy usage and bandwidth consumption, compared to prior art.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Distributed Secure Edge Computing Architecture Based on Blockchain for Real-Time Data Integrity in IoT Environments
    Xu, Rongxu
    Hang, Lei
    Jin, Wenquan
    Kim, Dohyeun
    ACTUATORS, 2021, 10 (08)
  • [22] Timely Data Collection for UAV-Based IoT Networks: A Deep Reinforcement Learning Approach
    Hu, Yingmeng
    Liu, Yan
    Kaushik, Aryan
    Masouros, Christos
    Thompson, John S.
    IEEE SENSORS JOURNAL, 2023, 23 (11) : 12295 - 12308
  • [23] Secure Data Provenance in Internet of Things using Hybrid Attribute based Crypt Technique
    Porkodi, S.
    Kesavaraja, D.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (04) : 2821 - 2842
  • [24] A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data
    Khan, Mohammad Ayoub
    Quasim, Mohammad Tabrez
    Alghamdi, Norah Saleh
    Khan, Mohammad Yahiya
    IEEE ACCESS, 2020, 8 : 52018 - 52027
  • [25] Risk and Compliance in IoT-Health Data Propagation : A Security-Aware Provenance based Approach
    Jaigirdar, Fariha Tasmin
    Rudolph, Carsten
    Bain, Chris
    2021 IEEE INTERNATIONAL CONFERENCE ON DIGITAL HEALTH (ICDH 2021), 2021, : 27 - 37
  • [26] Secure Data Provenance in Internet of Things using Hybrid Attribute based Crypt Technique
    S. Porkodi
    D. Kesavaraja
    Wireless Personal Communications, 2021, 118 : 2821 - 2842
  • [27] Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain
    Yan, Hao
    Liu, Yanan
    Qiu, Shuo
    Hu, Shengzhou
    Zhang, Weijian
    Xia, Jinyue
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (03): : 1129 - 1142
  • [28] Secure Medical Data Transmission Model for IoT-Based Healthcare Systems
    Elhoseny, Mohamed
    Ramirez-Gonzalez, Gustavo
    Abu-Elnasr, Osama M.
    Shawkat, Shihab A.
    Arunkumar, N.
    Farouk, Ahmed
    IEEE ACCESS, 2018, 6 : 20596 - 20608
  • [29] Zero Watermarking for the TIN DEM Data Based on the Edge Length
    Zhou, Qifei
    Zhu, Changqing
    Ren, Na
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2021, 10 (08)
  • [30] Enabling secure data transmission for wireless sensor networks based IoT applications
    Panahi, Uras
    Bayilmis, Cuneyt
    AIN SHAMS ENGINEERING JOURNAL, 2023, 14 (02)