Data Authentication and Anonymization in IoT Scenarios and Future 5G Networks Using Chaotic Digital Watermarking

Future Internet-of-Things (IoT) scenarios and applications are envisioned to be supported by emerging 5G networks. In this context, complex routing schemes for pervasive infrastructures are highly simplified, as every hardware element may stablish its own communication link with a 5G base station. However, this situation also introduces new risks, especially in the security field where innovative cyber-physical attacks and distributed denial of service attacks are becoming more popular and dangerous each day. Thus, data authentication, protection and anonymization in those new applications and schemes is a key challenge to be addressed. Besides, most devices in future IoT systems will be resource constrained, so traditional solutions based on private keys stored in devices’ memory and computationally heavy cryptographic algorithms will turn unsecure, inefficient or, directly, impossible to run. Therefore, in this paper we propose a new mechanism to protect, authenticate and anonymize data in IoT systems supported by future 5G networks. The proposed solution employs both digital watermarking techniques and lightweight cryptographic technologies. To generate keys in a secure and simple manner, physical unclonable functions are employed. Besides, to reduce as much as possible the computational cost of algorithms, chaotic dynamics will be considered. In order to evaluate the performance of the proposed solution an experimental validation based on simulation techniques is also carried out.

[1]  Nils Ole Tippenhauer,et al.  Legacy-Compliant Data Authentication for Industrial Control System Traffic , 2017, ACNS.

[2]  Gwenaël J. Doërr,et al.  Practical Security Analysis of Dirty Paper Trellis Watermarking , 2007, Information Hiding.

[3]  Borja Bordel,et al.  Improving the Complexity of the Lorenz Dynamics , 2017, Complex..

[4]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[5]  Taekyoung Kwon,et al.  A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things , 2020, IEEE Access.

[6]  F. Montoya,et al.  Trifork , a New Pseudorandom Number Generator Based on Lagged Fibonacci Maps , 2010 .

[7]  Borja Bordel,et al.  Protecting Industry 4.0 Systems Against the Malicious Effects of Cyber-Physical Attacks , 2017, UCAmI.

[8]  Elena Dubrova,et al.  CRC-Based Message Authentication for 5G Mobile Technology , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[9]  Yanina Protskaya,et al.  An anonymization protocol for the Internet of Things , 2017, 2017 International Symposium on Wireless Communication Systems (ISWCS).

[10]  Juha Karhunen,et al.  Advances in blind source separation (BSS) and independent component analysis (ICA) for nonlinear mixtures , 2004, Int. J. Neural Syst..

[11]  J. Mallet-Paret,et al.  The Poincare-Bendixson theorem for monotone cyclic feedback systems , 1990 .

[12]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[13]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[14]  Ernesto Damiani,et al.  A Distributed Approach to Privacy on the Cloud , 2015, 1503.08115.

[15]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[16]  Borja Bordel,et al.  Robust hardware-supported chaotic cryptosystems for streaming commutations among reduced computing power nodes , 2018, Analog Integrated Circuits and Signal Processing.

[17]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[18]  V. Masilamani,et al.  A novel digital watermarking scheme for data authentication and copyright protection in 5G networks , 2018, Comput. Electr. Eng..

[19]  Bashar Nuseibeh,et al.  Designing Privacy-aware Internet of Things Applications , 2017, Inf. Sci..

[20]  Ramón Alcarria,et al.  Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions , 2019, Electronics.

[21]  Borja Bordel,et al.  Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design , 2020, Int. J. Distributed Sens. Networks.

[22]  Huei-Wen Ferng,et al.  On security of wireless sensor networks: a data authentication protocol using digital signature , 2017, Wirel. Networks.

[23]  Andrea Cavallaro,et al.  Mobile Sensor Data Anonymization , 2019 .

[24]  A. Akhavan,et al.  A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .

[25]  Bashar Nuseibeh,et al.  Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms , 2016, IOT.

[26]  Xianbin Wang,et al.  Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.

[27]  Borja Bordel,et al.  Stochastic and Information Theory Techniques to Reduce Large Datasets and Detect Cyberattacks in Ambient Intelligence Environments , 2018, IEEE Access.

[28]  Miguel A. Labrador,et al.  HR-Auth: Heart Rate Data Authentication Using Consumer Wearables , 2018, 2018 IEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft).

[29]  Borja Bordel,et al.  A Robust Implementation of a Chaotic Cryptosystem for Streaming Communications in Wireless Sensor Networks , 2017, WorldCIST.

[30]  Wenshan Wang,et al.  A data authentication scheme for UAV ad hoc network communication , 2017, The Journal of Supercomputing.

[31]  Mostafa Azizi,et al.  Analysis of Quantum Cryptography Protocols by Model Checking , 2010 .

[32]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[33]  Jun-Zhao Sun,et al.  Adaptive Determination of Data Granularity for QoS-Constraint Data Gathering in Wireless Sensor Networks , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[34]  Ljiljana Brankovic,et al.  PRIVACY ISSUES IN KNOWLEDGE DISCOVERY AND DATA MINING , 2000 .

[35]  Borja Bordel,et al.  Service management in virtualization-based architectures for 5G systems with network slicing , 2020, Integr. Comput. Aided Eng..

[36]  William H. Robinson,et al.  A one Zener diode, one memristor crossbar architecture for a write-time-based PUF , 2015, 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS).

[37]  Amir Akhavan,et al.  A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .

[38]  Borja Bordel,et al.  An Inter-slice Management Solution for Future Virtualization-Based 5G Systems , 2019, AINA.

[39]  Jin Wang,et al.  Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[40]  L. Javier García-Villalba,et al.  A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things , 2016, Sensors.

[41]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[42]  Borja Bordel,et al.  Cyber-physical systems: Extending pervasive sensing from control theory to the Internet of Things , 2017, Pervasive Mob. Comput..

[43]  David E. Culler,et al.  Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.

[44]  V. Kavitha,et al.  Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop , 2017, Future Gener. Comput. Syst..

[45]  Ruisong Ye,et al.  A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism , 2011 .

[46]  Yong Bai,et al.  The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things , 2017, J. Electr. Comput. Eng..

[47]  Diego Sánchez de Rivera,et al.  Using 5G Technologies in the Internet of Things Handovers, Problems and Challenges , 2015, 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[48]  Safya Belghith,et al.  A commercial application of a chaos-based-stream cipher: Performance and Security analysis , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).

[49]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[50]  Marta Z. Kwiatkowska,et al.  PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.

[51]  Borja Bordel,et al.  An Intra-slice Chaotic-Based Security Solution for Privacy Preservation in Future 5G Systems , 2018, WorldCIST.

[52]  Shiguo Lian,et al.  Security Analysis of A Chaos-based Image Encryption Algorithm , 2005, ArXiv.