IoTSign: Protecting Privacy and Authenticity of IoT using Discrete Cosine Based Steganography

Remotely generated data by Intent of Things (IoT) has recently had a lot of attention for their huge benefits such as efficient monitoring and risk reduction. The transmitted streams usually consist of periodical streams (e.g. activities) and highly private information (e.g. IDs). Despite the obvious benefits, the concerns are the secrecy and the originality of the transferred data. Surprisingly, although these concerns have been well studied for static data, they have received only limited attention for streaming data. Therefore, this paper introduces a new steganographic mechanism that provides (1) robust privacy protection of secret information by concealing them arbitrarily in the transported readings employing a random key, and (2) permanent proof of originality for the normal streams. This model surpasses our previous works by employing the Discrete Cosine Transform to expand the hiding capacity and reduce complexity. The resultant distortion has been accurately measured at all stages - the original, the stego, and the recovered forms - using a well-known measurement matrix called Percentage Residual Difference (PRD). After thorough experiments on three types of streams (i.e. chemical, environmental and smart homes), it has been proven that the original streams have not been affected (< 1 %). Also, the mathematical analysis shows that the model has much lighter (i.e. linear) computational complexity O(n) compared to existing work.

[1]  Sajal K. Das,et al.  Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach , 2008 .

[2]  Qi Wang,et al.  On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[3]  Ja-Ling Wu,et al.  A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search , 2013, IEEE Transactions on Information Forensics and Security.

[4]  Ibrahim Khalil,et al.  Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings , 2015, Inf. Syst..

[5]  Chi-Yin Chow,et al.  A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.

[6]  Antonella Molinaro,et al.  Privacy-Preserving Forwarding Using Homomorphic Encryption for Information-Centric Wireless Ad Hoc Networks , 2019, IEEE Communications Letters.

[7]  Hayrettin Koymen,et al.  Compression of digital biomedical signals , 2006 .

[8]  Ayman Ibaida,et al.  Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach , 2016, Ad Hoc Networks.

[9]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[10]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[11]  Wenliang Du,et al.  Deriving private information from randomized data , 2005, SIGMOD '05.

[12]  Jiguo Yu,et al.  A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).

[13]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[14]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[15]  Ephraim Feig,et al.  Fast algorithms for the discrete cosine transform , 1992, IEEE Trans. Signal Process..

[16]  Jeannie R. Albrecht,et al.  Smart * : An Open Data Set and Tools for Enabling Research in Sustainable Homes , 2012 .

[17]  Ben Y. Zhao,et al.  Preserving Location Privacy in Geosocial Applications , 2014, IEEE Transactions on Mobile Computing.

[18]  N. Ahmed,et al.  Discrete Cosine Transform , 1996 .

[19]  P. Yip,et al.  Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .

[20]  Samir Kumar Bandyopadhyay,et al.  DCT Domain Encryption in LSB Steganography , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.

[21]  Shankar Vembu,et al.  Chemical gas sensor drift compensation using classifier ensembles , 2012 .

[22]  Yi Mu,et al.  Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[24]  Azizol Abdullah,et al.  AES and ECC Mixed for ZigBee Wireless Sensor Security , 2011 .

[25]  Bin Yang,et al.  Study on Security of Wireless Sensor Network Based on ZigBee Standard , 2009, 2009 International Conference on Computational Intelligence and Security.

[26]  Xiaodong Lin,et al.  A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems , 2013, IEEE Intelligent Systems.

[27]  Wenbo He,et al.  KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.

[28]  N. Vongurai,et al.  Frequency-Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform , 2012, 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation.

[29]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[30]  Shekhar Verma,et al.  Secure data aggregation in wireless sensor networks using homomorphic encryption , 2015 .

[31]  Kun Liu,et al.  Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.

[32]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[33]  Jimeng Sun,et al.  Hiding in the Crowd: Privacy Preservation on Evolving Streams through Correlation Tracking , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[34]  Ibrahim Khalil,et al.  Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach , 2015, Pervasive Mob. Comput..

[35]  Robert H. Deng,et al.  Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.

[36]  L. Zheng ZigBee Wireless Sensor Network in Industrial Applications , 2006, 2006 SICE-ICASE International Joint Conference.

[37]  Xiaohui Liang,et al.  UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid , 2013, IEEE Transactions on Smart Grid.

[38]  D. Vasumathi,et al.  A reversible data embedding scheme for MPEG-4 video using non-zero AC coefficients of DCT , 2013, 2013 IEEE International Conference on Computational Intelligence and Computing Research.

[39]  Saed Alrabaee,et al.  Aggregation function using Homomorphic encryption in participating sensing application , 2014, 2014 6th International Conference on Computer Science and Information Technology (CSIT).