Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Securing IoT data using steganography: A practical implementation approach
University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
2021 (English)In: Electronics, E-ISSN 2079-9292, Vol. 10, no 21, article id 2707Article in journal (Refereed) Published
Abstract [en]

Adding network connectivity to any “thing” can certainly provide great value, but it also brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” system’s capabilities, the validity and accuracy of transmitted data should be ensured. Due to the constrained environment of IoT devices, practical security implementation presents a great challenge. In this paper, we present a noise-resilient, low-overhead, lightweight steganography solution adequate for use in the IoT environment. The accuracy of hidden data is tested against corruption using multiple modulations and coding schemes (MCSs). Additive white Gaussian noise (AWGN) is added to the modulated data to simulate the noisy channel as well as several wireless technologies such as cellular, WiFi, and vehicular communications that are used between communicating IoT devices. The presented scheme is capable of hiding a high payload in audio signals (e.g., speech and music) with a low bit error rate (BER), high undetectability, low complexity, and low perceptibility. The proposed algorithm is evaluated using well-established performance evaluation techniques and has been demonstrated to be a practical candidate for the mass deployment of IoT devices.

Place, publisher, year, edition, pages
MDPI , 2021. Vol. 10, no 21, article id 2707
Keywords [en]
IoT cybersecurity, data protection, signal modulation, information hiding, digital audio, audio steganography
National Category
Media and Communication Technology Computer Sciences Communication Systems
Identifiers
URN: urn:nbn:se:hv:diva-17781DOI: 10.3390/electronics10212707Scopus ID: 2-s2.0-85118495117OAI: oai:DiVA.org:hv-17781DiVA, id: diva2:1621678
Available from: 2021-12-20 Created: 2021-12-20 Last updated: 2022-03-31

Open Access in DiVA

Electronics(2130 kB)405 downloads
File information
File name FULLTEXT01.pdfFile size 2130 kBChecksum SHA-512
96b2a998e034344d01894e3e1002bdf00ce96097980caf2f07b131b69df883f9199de4bbe60e764b6a1d7e7bec5124d83c74d5b0fce20d159803eb13660c06df
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Djebbar, Fatiha

Search in DiVA

By author/editor
Djebbar, Fatiha
By organisation
Division of Mathematics, Computer and Surveying Engineering
In the same journal
Electronics
Media and Communication TechnologyComputer SciencesCommunication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 405 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 222 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf