ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

被引:0
作者
Faraj, Omair [1 ,2 ]
Megias, David [1 ]
Garcia-Alfaro, Joaquin [2 ]
机构
[1] Univ Oberta Catalunya UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona 08018, Spain
[2] Inst Polytech Paris, Telecom SudParis, SAMOVAR, F-91120 Palaiseau, France
关键词
Data integrity; Data provenance; Internet of Things; Intrusion detection; Cybersecurity; Cryptography; Zero-watermarking; INTERNET; SCHEME; THINGS; PROTECTION;
D O I
10.1016/j.jisa.2024.103840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is integrating the Internet and smart devices in almost every domain, such as home automation, e-healthcare systems, vehicular networks, industrial control, and military applications. In these areas, sensory data, which is collected from multiple sources and managed through intermediate processing by multiple nodes, is used for decision-making processes. Ensuring data integrity and keeping track of data provenance are core requirements in such a highly dynamic context, since data provenance is an important tool for the assurance of data trustworthiness. Dealing with such requirements is challenging due to the limited computational and energy resources in IoT networks. This requires addressing several challenges such as processing overhead, secure provenance, bandwidth consumption and storage efficiency. In this paper, we propose Zero-watermarkIng based data pRovenanCe for iOt Networks (ZIRCON), a novel zero-watermarking approach to securely transmit provenance and ensure data integrity of sensor data in an IoT network. In ZIRCON, provenance information is stored in a tamper-proof network database through watermarks, generated at the source node before transmission. We provide an extensive security analysis showing the resilience of our scheme against passive and active attacks. We also compare our scheme with existing works based on performance metrics such as computational time, energy usage, and cost analysis. The results show that ZIRCON is robust against several attacks, lightweight, storage-efficient, and better in energy usage and bandwidth consumption, compared to prior art.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
    Zhang, Guoyin
    Kou, Liang
    Zhang, Liguo
    Liu, Chao
    Da, Qingan
    Sun, Jianguo
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [32] Moment invariants based zero watermarking algorithm for trajectory data
    Ren, Na
    Hu, Yuchen
    Zhu, Changqing
    Guo, Shuitao
    Zhu, Xianshu
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 86
  • [33] Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems
    Hussien, Zaid Alaa
    Abdulmalik, Husam. A. A.
    Hussain, Mohammed Abdulridha
    Nyangaresi, Vincent Omollo
    Ma, Junchao
    Abduljabbar, Zaid Ameen
    Abduljaleel, Iman Qays
    APPLIED SCIENCES-BASEL, 2023, 13 (02):
  • [34] Secure management of retinal imaging based on deep learning, zero-watermarking and reversible data hiding
    Garcia-Nonoal, Zaira
    Mata-Mendoza, David
    Cedillo-Hernandez, Manuel
    Nakano-Miyatake, Mariko
    VISUAL COMPUTER, 2024, 40 (01) : 245 - 260
  • [35] Data Authentication and Anonymization in IoT Scenarios and Future 5G Networks Using Chaotic Digital Watermarking
    Bordel, Borja
    Alcarria, Ramon
    Robles, Tomas
    Sanchez Iglesias, Marcos
    IEEE ACCESS, 2021, 9 : 22378 - 22398
  • [36] Secure management of retinal imaging based on deep learning, zero-watermarking and reversible data hiding
    Zaira Garcia-Nonoal
    David Mata-Mendoza
    Manuel Cedillo-Hernandez
    Mariko Nakano-Miyatake
    The Visual Computer, 2024, 40 : 245 - 260
  • [37] Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
    Atiewi, Saleh
    Al-Rahayfeh, Amer
    Almiani, Muder
    Yussof, Salman
    Alfandi, Omar
    Abugabah, Ahed
    Jararweh, Yaser
    IEEE ACCESS, 2020, 8 : 113498 - 113511
  • [38] SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs
    Salim, Ahmed
    Osamy, Walid
    Aziz, Ahmed
    Khedr, Ahmed M.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 202
  • [39] Tiger Tally: A secure IoT data management approach based on redactable blockchain
    Zhao, Liushun
    Guo, Deke
    Luo, Lailong
    Xie, Junjie
    Shen, Yulong
    Ren, Bangbang
    COMPUTER NETWORKS, 2024, 248
  • [40] Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city
    Hundera, Negalign Wake
    Jin, Chuanjie
    Geressu, Dagmawit Mesfin
    Aftab, Muhammad Umar
    Olanrewaju, Oluwasanmi Ariyo
    Xiong, Hu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (21) : 29673 - 29697