ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

被引:0
作者
Faraj, Omair [1 ,2 ]
Megias, David [1 ]
Garcia-Alfaro, Joaquin [2 ]
机构
[1] Univ Oberta Catalunya UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona 08018, Spain
[2] Inst Polytech Paris, Telecom SudParis, SAMOVAR, F-91120 Palaiseau, France
关键词
Data integrity; Data provenance; Internet of Things; Intrusion detection; Cybersecurity; Cryptography; Zero-watermarking; INTERNET; SCHEME; THINGS; PROTECTION;
D O I
10.1016/j.jisa.2024.103840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is integrating the Internet and smart devices in almost every domain, such as home automation, e-healthcare systems, vehicular networks, industrial control, and military applications. In these areas, sensory data, which is collected from multiple sources and managed through intermediate processing by multiple nodes, is used for decision-making processes. Ensuring data integrity and keeping track of data provenance are core requirements in such a highly dynamic context, since data provenance is an important tool for the assurance of data trustworthiness. Dealing with such requirements is challenging due to the limited computational and energy resources in IoT networks. This requires addressing several challenges such as processing overhead, secure provenance, bandwidth consumption and storage efficiency. In this paper, we propose Zero-watermarkIng based data pRovenanCe for iOt Networks (ZIRCON), a novel zero-watermarking approach to securely transmit provenance and ensure data integrity of sensor data in an IoT network. In ZIRCON, provenance information is stored in a tamper-proof network database through watermarks, generated at the source node before transmission. We provide an extensive security analysis showing the resilience of our scheme against passive and active attacks. We also compare our scheme with existing works based on performance metrics such as computational time, energy usage, and cost analysis. The results show that ZIRCON is robust against several attacks, lightweight, storage-efficient, and better in energy usage and bandwidth consumption, compared to prior art.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Blockchain-based secure multifunctional data aggregation for fog-IoT environments
    Abbas, Mehdi Madjid
    Merad-Boudia, Omar Rafik
    Senouci, Sidi Mohammed
    Belalem, Ghalem
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (21)
  • [42] Zero watermarking for vector geographic point data based on convex layers
    Zhou, Qifei
    Zhao, Qiang
    She, Yingchen
    Yang, Wen
    Hu, Luanyun
    Chen, Weitong
    Ren, Na
    Zhu, Changqing
    COMPUTERS & GEOSCIENCES, 2025, 196
  • [43] Secure Key Distribution for IoT Networks Based on Physical Layer Security
    Alshamaseen, Tasneem
    Althunibat, Saud
    Qaraqe, Marwa
    2021 IEEE 26TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2021,
  • [44] A Secure IoT-Based Healthcare System With Body Sensor Networks
    Yeh, Kuo-Hui
    IEEE ACCESS, 2016, 4 : 10288 - 10299
  • [45] A secure and extensible blockchain-based data provenance framework for the Internet of Things
    Marten Sigwart
    Michael Borkowski
    Marco Peise
    Stefan Schulte
    Stefan Tai
    Personal and Ubiquitous Computing, 2024, 28 : 309 - 323
  • [46] Zero-Parameter-Information Data Integrity Attacks and Countermeasures in IoT-Based Smart Grid
    Zhang, Zhenyong
    Deng, Ruilong
    Yau, David K. Y.
    Cheng, Peng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) : 6608 - 6623
  • [47] A secure and extensible blockchain-based data provenance framework for the Internet of Things
    Sigwart, Marten
    Borkowski, Michael
    Peise, Marco
    Schulte, Stefan
    Tai, Stefan
    PERSONAL AND UBIQUITOUS COMPUTING, 2020, 28 (1) : 309 - 323
  • [48] Secure Data Provenance in Internet of Things based Networks by Outsourcing Attribute based Signatures and using Bloom Filters
    Siddiqui, Muhammad Shoaib
    Rahman, Atiqur
    Nadeem, Adnan
    Alzahrani, Ali M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (05) : 221 - 226
  • [49] A zero-watermarking approach for DICOM images authentication based on Jacobian model
    Tayachi, Mayssa
    Nana, Laurent
    Pascu, Anca
    Benzarti, Faouzi
    INFORMATION SECURITY JOURNAL, 2024, 33 (05): : 508 - 527
  • [50] HCFAIUN: A novel hyperelliptic curve and fuzzy extractor-based authentication for secure data transmission in IoT-based UAV networks
    Sharma, Jatin
    Mehra, Pawan Singh
    VEHICULAR COMMUNICATIONS, 2024, 49