ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

被引:0
|
作者
Faraj, Omair [1 ,2 ]
Megias, David [1 ]
Garcia-Alfaro, Joaquin [2 ]
机构
[1] Univ Oberta Catalunya UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona 08018, Spain
[2] Inst Polytech Paris, Telecom SudParis, SAMOVAR, F-91120 Palaiseau, France
关键词
Data integrity; Data provenance; Internet of Things; Intrusion detection; Cybersecurity; Cryptography; Zero-watermarking; INTERNET; SCHEME; THINGS; PROTECTION;
D O I
10.1016/j.jisa.2024.103840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is integrating the Internet and smart devices in almost every domain, such as home automation, e-healthcare systems, vehicular networks, industrial control, and military applications. In these areas, sensory data, which is collected from multiple sources and managed through intermediate processing by multiple nodes, is used for decision-making processes. Ensuring data integrity and keeping track of data provenance are core requirements in such a highly dynamic context, since data provenance is an important tool for the assurance of data trustworthiness. Dealing with such requirements is challenging due to the limited computational and energy resources in IoT networks. This requires addressing several challenges such as processing overhead, secure provenance, bandwidth consumption and storage efficiency. In this paper, we propose Zero-watermarkIng based data pRovenanCe for iOt Networks (ZIRCON), a novel zero-watermarking approach to securely transmit provenance and ensure data integrity of sensor data in an IoT network. In ZIRCON, provenance information is stored in a tamper-proof network database through watermarks, generated at the source node before transmission. We provide an extensive security analysis showing the resilience of our scheme against passive and active attacks. We also compare our scheme with existing works based on performance metrics such as computational time, energy usage, and cost analysis. The results show that ZIRCON is robust against several attacks, lightweight, storage-efficient, and better in energy usage and bandwidth consumption, compared to prior art.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Node-Oriented Secure Data Transmission Algorithm Based on IoT System in Social Networks
    Li, Xiaoli
    Wu, Jia
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (12) : 2898 - 2902
  • [42] Cepstrum-Based Watermarking for Secure Underwater Data Transmission
    Bilal, Muhammad
    Liu, Songzuo
    Zhou, Tian
    Zuberi, Habib Hussain
    Khan, Mohsin Abrar
    17TH ACM INTERNATIONAL CONFERENCE ON UNDERWATER NETWORKS & SYSTEMS, WUWNET 2023, 2024,
  • [43] An IoT-based secure data transmission in WBSN
    Karthiga I.
    Sankar S.
    International Journal of Cloud Computing, 2020, 9 (2-3): : 311 - 329
  • [44] Secure Data Provenance Compression Using Arithmetic Coding in Wireless Sensor Networks
    Hussain, Syed Rafiul
    Wang, Changda
    Sultana, Salmin
    Bertino, Elisa
    2014 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2014,
  • [45] A Digital Watermarking Approach to Secure and Precise Range Query Processing in Sensor Networks
    Yi, Yeqing
    Li, Rui
    Chen, Fei
    Liu, Alex X.
    Lin, Yaping
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 1950 - 1958
  • [46] Risk and Compliance in IoT-Health Data Propagation : A Security-Aware Provenance based Approach
    Jaigirdar, Fariha Tasmin
    Rudolph, Carsten
    Bain, Chris
    2021 IEEE INTERNATIONAL CONFERENCE ON DIGITAL HEALTH (ICDH 2021), 2021, : 27 - 37
  • [47] Watermarking schemes for secure data aggregation in wireless sensor networks: A review paper
    Dhiman, Vandana
    Khandnor, Padmavati
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3087 - 3091
  • [48] An approach to evaluate data trustworthiness based on data provenance
    Dai, Chenyun
    Lin, Dan
    Bertino, Elisa
    Kantarcioglu, Murat
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 82 - +
  • [49] Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks
    Jariwala, Vivaksha
    Patel, Himanshu
    Patel, Parth
    Jinwala, Devesh C.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2014, 5 (03) : 77 - 99
  • [50] Secure data aggregation using quantum key management in IoT networks
    Thenmozhi R.
    Sakthivel P.
    Kulothungan K.
    Journal of Intelligent and Fuzzy Systems, 2024, 1 (01):