ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

04/29/2023
by   Omair Faraj, et al.
0

The Internet of Things (IoT) is integrating the Internet and smart devices in almost every domain such as home automation, e-healthcare systems, vehicular networks, industrial control and military applications. In these sectors, sensory data, which is collected from multiple sources and managed through intermediate processing by multiple nodes, is used for decision-making processes. Ensuring data integrity and keeping track of data provenance is a core requirement in such a highly dynamic context, since data provenance is an important tool for the assurance of data trustworthiness. Dealing with such requirements is challenging due to the limited computational and energy resources in IoT networks. This requires addressing several challenges such as processing overhead, secure provenance, bandwidth consumption and storage efficiency. In this paper, we propose ZIRCON, a novel zero-watermarking approach to establish end-to-end data trustworthiness in an IoT network. In ZIRCON, provenance information is stored in a tamper-proof centralized network database through watermarks, generated at source node before transmission. We provide an extensive security analysis showing the resilience of our scheme against passive and active attacks. We also compare our scheme with existing works based on performance metrics such as computational time, energy utilization and cost analysis. The results show that ZIRCON is robust against several attacks, lightweight, storage efficient, and better in energy utilization and bandwidth consumption, compared to prior art.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/15/2018

Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things

In the Internet of Things (IoT), things can be connected to the Internet...
research
05/04/2022

V'CER: Efficient Certificate Validation in Constrained Networks

We address the challenging problem of efficient trust establishment in c...
research
02/22/2022

Authenticated time for detecting GNSS attacks

Information cross-validation can be a powerful tool to detect manipulate...
research
04/30/2021

LightIoT: Lightweight and Secure Communication for Energy-Efficient IoT in Health Informatics

Internet of Things (IoT) is considered as a key enabler of health inform...
research
12/11/2020

Advanced Algorithms in Heterogeneous and Uncertain Networking Environments

Communication networks are used today everywhere and on every scale: sta...
research
12/03/2019

Optimal Green Hybrid Attacks in Secure IoT

In pursuance to understand the behavior of a potential green hybrid atta...
research
06/01/2021

A reinforcement learning approach to improve communication performance and energy utilization in fog-based IoT

Recent research has shown the potential of using available mobile fog de...

Please sign up or login with your details

Forgot password? Click here to reset