Abstract
Adding network connectivity to any “thing” can certainly provide great value, but it also brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” system’s capabilities, the validity and accuracy of transmitted data should be ensured. Due to the constrained environment of IoT devices, practical security implementation presents a great challenge. In this paper, we present a noise-resilient, low-overhead, lightweight steganography solution adequate for use in the IoT environment. The accuracy of hidden data is tested against corruption using multiple modulations and coding schemes (MCSs). Additive white Gaussian noise (AWGN) is added to the modulated data to simulate the noisy channel as well as several wireless technologies such as cellular, WiFi, and vehicular communications that are used between communicating IoT devices. The presented scheme is capable of hiding a high payload in audio signals (e.g., speech and music) with a low bit error rate (BER), high undetectability, low complexity, and low perceptibility. The proposed algorithm is evaluated using well-established performance evaluation techniques and has been demonstrated to be a practical candidate for the mass deployment of IoT devices.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference56 articles.
1. Internet of Things A to Z: Technologies and Applications;Hassan,2018
2. Towards a Definition of the Internet of Things (IoT);Minerva;IEEE Internet Initiat.,2015
3. Internet of Thingshttps://www.ietf.org/topics/iot/
4. Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security
5. A New Rule for Cost Reassignment in Adaptive Steganography;Zhou;IEEE Trans. Inf. Forensics Secur.,2017
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献