Blockchain Meets Generative Behavior Steganography: A Novel Covert Communication Framework for Secure IoT Edge Computing

被引:1
|
作者
Cao, Yuanlong [1 ,3 ]
Li, Junjie [2 ,3 ]
Chao, Kailin [2 ,3 ]
Xiao, Jianmao [2 ,3 ]
Lei, Gang [2 ,3 ]
机构
[1] Jiangxi Normal Univ, Sch Comp Informat Engn, Nanchang 330022, Peoples R China
[2] Jiangxi Normal Univ, Sch Software, Nanchang 330027, Peoples R China
[3] Jiangxi Normal Univ, Jiangxi Blockchain Data Secur & Governance Engn Re, Nanchang 330027, Peoples R China
关键词
Internet of things; Edge computing; Blockchain; Covert communication; Communication security; Generative behavior steganography; GAME;
D O I
10.23919/cje.2023.00.382
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The rapid development of Internet of things (IoT) and edge computing technologies has brought forth numerous possibilities for the intelligent and digital future. The frequent communication and interaction between devices inevitably generate a large amount of sensitive information. Deploying a blockchain network to store sensitive data is crucial for ensuring privacy and security. The openness and synchronicity of blockchain networks give rise to challenges such as transaction privacy and storage capacity issues, significantly impeding their development in the context of edge computing and IoT. This paper proposes a reliable fog computing service solution based on a blockchain fog architecture. This paper stores data files in the inter planetary file system (IPFS) and encrypts the file hash values used for retrieving data files with stream cipher encryption. It employs a steganographic transmission technique leveraging AlphaZero's Gomoku algorithm to discretely transmit the stream cipher key across the blockchain network without a carrier, thus achieving dual encryption. This approach aims to mitigate the storage burden on the blockchain network while ensuring the security of transaction data. Experimental results demonstrate that the model enhances the transmission capacity of confidential information from kilobytes (KB) to megabytes (MB) and exhibits high levels of covert and security features.
引用
收藏
页码:886 / 898
页数:13
相关论文
共 45 条
  • [21] A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT
    Shiqiang Zhang
    Dongzhi Cao
    The Journal of Supercomputing, 2024, 80 : 6778 - 6808
  • [22] RETRACTED ARTICLE: Performance evaluation of secure blockchain framework for IoT based data communication
    Rasmeet Kaur
    Aleem Ali
    International Journal of System Assurance Engineering and Management, 2023, 14 : 492 - 492
  • [23] A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain
    Wu, Zeng
    Huang, Hui
    Zhou, Yuping
    Wu, Chenhuang
    CONNECTION SCIENCE, 2022, 34 (01) : 1999 - 2025
  • [24] Adaptive Clustering Hierarchical PBFT Algorithm for Secure and Efficient Blockchain-Based IoT Edge Computing
    Zheng, Jiali
    Xie, Jincheng
    Su, Yanting
    IEEE SENSORS JOURNAL, 2025, 25 (02) : 3252 - 3266
  • [25] RETRACTED: Performance evaluation of secure blockchain framework for IoT based data communication (Retracted Article)
    Kaur, Rasmeet
    Ali, Aleem
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023, 14 (01) : 492 - 492
  • [26] A novel blockchain based framework to secure IoT-LLNs against routing attacks
    Sahay, Rashmi
    Geethakumari, G.
    Mitra, Barsha
    COMPUTING, 2020, 102 (11) : 2445 - 2470
  • [27] A novel blockchain based framework to secure IoT-LLNs against routing attacks
    Rashmi Sahay
    G. Geethakumari
    Barsha Mitra
    Computing, 2020, 102 : 2445 - 2470
  • [28] Computing Power Networking Meets Blockchain: A Reputation-Enhanced Trading Framework for Decentralized IoT Cloud Services
    Lin, Li
    Wu, Jiapeng
    Zhou, Zhi
    Zhao, Jin
    Li, Peng
    Xiong, Jinbo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 17082 - 17096
  • [29] Distributed Secure Edge Computing Architecture Based on Blockchain for Real-Time Data Integrity in IoT Environments
    Xu, Rongxu
    Hang, Lei
    Jin, Wenquan
    Kim, Dohyeun
    ACTUATORS, 2021, 10 (08)
  • [30] Efficient Framework to Secure Communication in IoT Using Novel Finite Field Encryption
    Akanksha, Eisha
    INTELLIGENT SYSTEMS IN CYBERNETICS AND AUTOMATION CONTROL THEORY, 2019, 860 : 1 - 11