ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

被引:0
|
作者
Faraj, Omair [1 ,2 ]
Megias, David [1 ]
Garcia-Alfaro, Joaquin [2 ]
机构
[1] Univ Oberta Catalunya UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona 08018, Spain
[2] Inst Polytech Paris, Telecom SudParis, SAMOVAR, F-91120 Palaiseau, France
关键词
Data integrity; Data provenance; Internet of Things; Intrusion detection; Cybersecurity; Cryptography; Zero-watermarking; INTERNET; SCHEME; THINGS; PROTECTION;
D O I
10.1016/j.jisa.2024.103840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is integrating the Internet and smart devices in almost every domain, such as home automation, e-healthcare systems, vehicular networks, industrial control, and military applications. In these areas, sensory data, which is collected from multiple sources and managed through intermediate processing by multiple nodes, is used for decision-making processes. Ensuring data integrity and keeping track of data provenance are core requirements in such a highly dynamic context, since data provenance is an important tool for the assurance of data trustworthiness. Dealing with such requirements is challenging due to the limited computational and energy resources in IoT networks. This requires addressing several challenges such as processing overhead, secure provenance, bandwidth consumption and storage efficiency. In this paper, we propose Zero-watermarkIng based data pRovenanCe for iOt Networks (ZIRCON), a novel zero-watermarking approach to securely transmit provenance and ensure data integrity of sensor data in an IoT network. In ZIRCON, provenance information is stored in a tamper-proof network database through watermarks, generated at the source node before transmission. We provide an extensive security analysis showing the resilience of our scheme against passive and active attacks. We also compare our scheme with existing works based on performance metrics such as computational time, energy usage, and cost analysis. The results show that ZIRCON is robust against several attacks, lightweight, storage-efficient, and better in energy usage and bandwidth consumption, compared to prior art.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance
    Faraj, Omair
    Megias, David
    Garcia-Alfaro, Joaquin
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [2] BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments
    Javaid, Uzair
    Aman, Muhammad Naveed
    Sikdar, Biplab
    BLOCKSYS'18: PROCEEDINGS OF THE 1ST BLOCKCHAIN-ENABLED NETWORKED SENSOR SYSTEMS, 2018, : 13 - 18
  • [3] A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks
    Hameed, Khizar
    Khan, M. Saleem
    Ahmed, Idrees
    Ahmad, Zuhaib U.
    Khan, Abid
    Haider, Aun
    Javaid, Nadeem
    PROCEEDINGS OF 2016 19TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS), 2016, : 119 - 126
  • [4] Secure and Efficient Distributed Network Provenance for IoT: A Blockchain-Based Approach
    Liu, Dongxiao
    Ni, Jianbing
    Huang, Cheng
    Lin, Xiaodong
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) : 7564 - 7574
  • [5] A Secure IoT Data Integrity Auditing Scheme Based on Consortium Blockchain
    Dong, Guofang
    Wang, Xia
    2020 5TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (IEEE ICBDA 2020), 2020, : 246 - 250
  • [6] Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
    Hameed, Khizar
    Khan, Abid
    Ahmed, Mansoor
    Reddy, Alavalapati Goutham
    Rathore, M. Mazhar
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 274 - 289
  • [7] A Reference Based Secure and Robust Zero Watermarking System
    Singh, Satendra Pal
    Bhatnagar, Gaurav
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 1, 2020, 1022 : 325 - 337
  • [8] A Blockchain-Based Scheme for Secure Data Provenance in Wireless Sensor Networks
    Zeng, Yu
    Zhang, Xing
    Akhtar, Rizwan
    Wang, Changda
    2018 14TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2018), 2018, : 13 - 18
  • [9] Secure Data Provenance in Home Energy Monitoring Networks
    Chia, Ming Hong
    Keoh, Sye Loong
    Tang, Zhaohui
    3RD ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2017), 2017, : 7 - 14
  • [10] A New Hybrid Method for Secure Data Transmission Using Watermarking based on Fuzzy Encryption in IoT
    Mohammadi, Hossein
    Ghaderzadeh, Abdulbaghi
    Sheikhahmadi, Amir
    IETE JOURNAL OF RESEARCH, 2024, 70 (04) : 3493 - 3514