Low Power Data Integrity in IoT Systems

被引:37
作者
Aman, Muhammad Naveed [1 ]
Sikdar, Biplab [2 ]
Chua, Kee Chaing [2 ]
Ali, Anwar [3 ]
机构
[1] Natl Univ Singapore, Dept Comp Sci, Singapore 117417, Singapore
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117583, Singapore
[3] Univ Technol Nowshera, Dept Elect Technol, Nowshera 24100, Pakistan
关键词
Cyber security; data integrity; Internet of Things (IoT); random permutation; DESIGN; TECHNOLOGY; CHALLENGES; SECURITY; INTERNET;
D O I
10.1109/JIOT.2018.2833206
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Devices in the Internet of Things (IoT) produce large amounts of sensitive data. However, the use of the public Internet for data transfer by IoT devices makes them susceptible to cyber attacks. Among these attacks, data tampering or modification attacks to disrupt or bias the states of applications using these data may result in widespread damage and outages. To detect such attacks, this paper proposes an efficient and simple technique to detect data tampering in IoT systems. The proposed mechanism uses a random time hopping sequence and random permutations to hide validation information. We also present a formal security analysis of the proposed protocol. Performance analysis of the proposed protocol shows that it has low computational complexity and is suitable for IoT systems.
引用
收藏
页码:3102 / 3113
页数:12
相关论文
共 44 条
[1]  
Alioto M., 2017, ENABLING INTERNET TH
[2]   Mutual Authentication in IoT Systems Using Physical Unclonable Functions [J].
Aman, Muhammad Naveed ;
Chua, Kee Chaing ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1327-1340
[3]  
[Anonymous], 4418 RFC INT ENG TAS
[4]  
[Anonymous], 1996, RSA LAB CRYPTOBYTES
[5]  
[Anonymous], 2015, NDSS
[6]  
[Anonymous], 1994, Spread Spectrum Communications Handbook
[7]   Threat-based Security Analysis for the Internet of Things [J].
Atamli, Ahmad W. ;
Martin, Andrew .
2014 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2014, :35-43
[8]  
Baran M., 1999, Wiley Encyclopedia of Electrical and Electronics Engineering
[9]   The security of the cipher block chaining message authentication code [J].
Bellare, M ;
Kilian, J ;
Rogaway, P .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 61 (03) :362-399
[10]  
Blanchet B., 2016, PROVERIF AUTOMATIC C