Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques

被引:0
作者
Das, Ria [1 ]
Das, Indrajit [2 ]
机构
[1] Jadavpur Univ, Sch Mobile Comp & Commun, Kolkata, India
[2] Meghnad Saha Inst Technol, Informat Technol Dept, Kolkata, India
来源
2016 SECOND IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN) | 2016年
关键词
Internet of Things (IoT); Encryption Cryptography; Steganography; Most Significant Bit (MSB); Least Significant Bit (LSB); Substitution technique;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Owing to the unprecedented growth in computing power, electronics miniaturization and mobile and wireless network interconnections the internet has metamorphosed into Internet of Things (IoT) which refers to next stage of the information revolution whose context involves billions of individuals and devices interconnected to facilitate exchange of huge volume of data and information from diverse locations, demanding the consequent necessity for smart data aggregation followed by an increased obligation to index, hoard and process data with higher efficiency and effectiveness. But along with its myriad offered benefits and applications, emerges a novel complexity aspect in terms of many inherent hassles primarily security concerns during data transfer phases in IoT covering mostly data confidentiality and integrity features. Thus to enhance safe data transfer in smart IoT environment, a security scheme is proposed in this paper which addresses both the aforesaid issues, employing an integrated approach of lightweight cryptography and steganography (Simple LSB Substitution) technique during data transfer between IoT device and Home Server and adoption of combined approach of cryptography and steganography (Proposed MSB-LSB Substitution) technique during data transfer phases between Home Server and Cloud Servers.
引用
收藏
页码:296 / 301
页数:6
相关论文
共 24 条
  • [1] Review on lightweight cryptography techniques and steganography techniques for IoT environment
    Supriya, K. Sangeetha
    Lovesum, S. P. Jeno
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (09) : 4210 - 4228
  • [2] Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
    Khari, Manju
    Garg, Aditya Kumar
    Gandomi, Amir H.
    Gupta, Rashmi
    Patan, Rizwan
    Balusamy, Balamurugan
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2020, 50 (01): : 73 - 80
  • [3] Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
    Naser, Mohammed Abdullah
    Al-alak, Saif M. Kh.
    Hussein, Ahmed Mohammed
    Jawad, Majid Jabbar
    BAGHDAD SCIENCE JOURNAL, 2022, 19 (06) : 1362 - 1368
  • [4] A Review of Combined Effect of Cryptography & Steganography Techniques to Secure the Information
    Mustafa, Ghulam
    Ashraf, Rehan
    Ul Haq, Inam
    Khalid, Yusra
    Ul Islam, Rafiq
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, ENGINEERING, AND DESIGN (ICCED), 2019,
  • [5] Improvised Secure data transfer through the use of steganography for IoT network node data security
    Elakia, V. M.
    Enush, M.
    Shoba, R.
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [6] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Varghese, Fredy
    Sasikala, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2291 - 2318
  • [7] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Fredy Varghese
    P. Sasikala
    Wireless Personal Communications, 2023, 129 : 2291 - 2318
  • [8] A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods
    Nandakumar, Aishwarya
    Harmya, P.
    Jagadeesh, Noopa
    Anju, S. S.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 498 - 505
  • [9] Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques
    Pekerti, Albertus Anugerah
    Sasongko, Arif
    Indrayanto, Adi
    IEEE ACCESS, 2024, 12 : 75146 - 75168
  • [10] Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques
    Wahab, Osama Fouad Abdel
    Khalaf, Ashraf A. M.
    Hussein, Aziza I.
    Hamed, Hesham F. A.
    IEEE ACCESS, 2021, 9 : 31805 - 31815