ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

被引:0
|
作者
Faraj, Omair [1 ,2 ]
Megias, David [1 ]
Garcia-Alfaro, Joaquin [2 ]
机构
[1] Univ Oberta Catalunya UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona 08018, Spain
[2] Inst Polytech Paris, Telecom SudParis, SAMOVAR, F-91120 Palaiseau, France
关键词
Data integrity; Data provenance; Internet of Things; Intrusion detection; Cybersecurity; Cryptography; Zero-watermarking; INTERNET; SCHEME; THINGS; PROTECTION;
D O I
10.1016/j.jisa.2024.103840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is integrating the Internet and smart devices in almost every domain, such as home automation, e-healthcare systems, vehicular networks, industrial control, and military applications. In these areas, sensory data, which is collected from multiple sources and managed through intermediate processing by multiple nodes, is used for decision-making processes. Ensuring data integrity and keeping track of data provenance are core requirements in such a highly dynamic context, since data provenance is an important tool for the assurance of data trustworthiness. Dealing with such requirements is challenging due to the limited computational and energy resources in IoT networks. This requires addressing several challenges such as processing overhead, secure provenance, bandwidth consumption and storage efficiency. In this paper, we propose Zero-watermarkIng based data pRovenanCe for iOt Networks (ZIRCON), a novel zero-watermarking approach to securely transmit provenance and ensure data integrity of sensor data in an IoT network. In ZIRCON, provenance information is stored in a tamper-proof network database through watermarks, generated at the source node before transmission. We provide an extensive security analysis showing the resilience of our scheme against passive and active attacks. We also compare our scheme with existing works based on performance metrics such as computational time, energy usage, and cost analysis. The results show that ZIRCON is robust against several attacks, lightweight, storage-efficient, and better in energy usage and bandwidth consumption, compared to prior art.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Tiger Tally: A secure IoT data management approach based on redactable blockchain
    Zhao, Liushun
    Guo, Deke
    Luo, Lailong
    Xie, Junjie
    Shen, Yulong
    Ren, Bangbang
    COMPUTER NETWORKS, 2024, 248
  • [22] Preserving Data Integrity in IoT Networks under Opportunistic Data Manipulation
    Bhattacharjee, Shameek
    Salimitari, Mehrdad
    Chatterjee, Mainak
    Kwiat, Kevin
    Kamhoua, Charles
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 446 - 453
  • [23] Chaotic based secure watermarking approach for medical images
    Thakur, S.
    Singh, A. K.
    Ghrera, S. P.
    Mohan, A.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (7-8) : 4263 - 4276
  • [24] A Sanitization Approach to Secure Shared Data in an IoT Environment
    Lin, Jerry Chun-Wei
    Wu, Jimmy Ming-Tai
    Fournier-Viger, Philippe
    Djenouri, Youcef
    Chen, Chun-Hao
    Zhang, Yuyu
    IEEE ACCESS, 2019, 7 : 25359 - 25368
  • [25] Chaotic based secure watermarking approach for medical images
    S. Thakur
    A. K. Singh
    S. P. Ghrera
    A. Mohan
    Multimedia Tools and Applications, 2020, 79 : 4263 - 4276
  • [26] Elman-Based Secure Data Transmission Quality Prediction for Complex IoT Networks
    Yin, Fagen
    MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [27] Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT
    Li, Tao
    Hofmann, Christoph
    Franz, Elke
    PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 365 - 368
  • [28] Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
    Wang, Changda
    Hussain, Syed Rafiul
    Bertino, Elisa
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) : 405 - 418
  • [29] Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks
    Sun, Xingming
    Su, Jianwei
    Wang, Baowei
    Liu, Qi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 407 - 416
  • [30] Secure data aggregation in wireless multimedia sensor networks via watermarking
    Kablosuz çoklu ortam algilayici aǧlarinda damgalama le güvenl ver kümeleme
    1600, Gazi Universitesi (28):