TY - JOUR
T1 - An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
AU - Bairagi, Anupam Kumar
AU - Khondoker, Rahamatullah
AU - Islam, Rafiqul
N1 - Includes bibliographical references.
PY - 2016/12/1
Y1 - 2016/12/1
N2 - With the manifestation of the Internet of Things (IoT) and fog computing, the quantity of edge devices is escalating exponentially all over the world, providing better services to the end user with the help of existing and upcoming communication infrastructures. All of these devices are producing and communicating a huge amount of data and control information around this open IoT environment. A large amount of this information contains personal and important information for the user as well as for the organization. The number of attack vectors for malicious users is high due to the openness, distributed nature, and lack of control over the whole IoT environment. For building the IoT as an effective service platform, end users need to trust the system. For this reason, security and privacy of information in the IoT is a great concern in critical infrastructures such as the smart home, smart city, smart healthcare, smart industry, etc. In this article, we propose three information hiding techniques for protecting communication in critical IoT infrastructure with the help of steganography, where RGB images are used as carriers for the information. We hide the information in the deeper layer of the image channels with minimum distortion in the least significant bit (lsb) to be used as indication of data. We analyze our technique both mathematically and experimentally. Mathematically, we show that the adversary cannot predict the actual information by analysis. The proposed approach achieved better imperceptibility and capacity than the various existing techniques along with better resistance to steganalysis attacks such as histogram analysis and RS analysis, as proven experimentally.
AB - With the manifestation of the Internet of Things (IoT) and fog computing, the quantity of edge devices is escalating exponentially all over the world, providing better services to the end user with the help of existing and upcoming communication infrastructures. All of these devices are producing and communicating a huge amount of data and control information around this open IoT environment. A large amount of this information contains personal and important information for the user as well as for the organization. The number of attack vectors for malicious users is high due to the openness, distributed nature, and lack of control over the whole IoT environment. For building the IoT as an effective service platform, end users need to trust the system. For this reason, security and privacy of information in the IoT is a great concern in critical infrastructures such as the smart home, smart city, smart healthcare, smart industry, etc. In this article, we propose three information hiding techniques for protecting communication in critical IoT infrastructure with the help of steganography, where RGB images are used as carriers for the information. We hide the information in the deeper layer of the image channels with minimum distortion in the least significant bit (lsb) to be used as indication of data. We analyze our technique both mathematically and experimentally. Mathematically, we show that the adversary cannot predict the actual information by analysis. The proposed approach achieved better imperceptibility and capacity than the various existing techniques along with better resistance to steganalysis attacks such as histogram analysis and RS analysis, as proven experimentally.
KW - Critical infrastructure
KW - IoT
KW - Privacy and security
KW - RS analysis
KW - Steganography
UR - http://www.scopus.com/inward/record.url?scp=84981274771&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84981274771&partnerID=8YFLogxK
U2 - 10.1080/19393555.2016.1206640
DO - 10.1080/19393555.2016.1206640
M3 - Article
AN - SCOPUS:84981274771
SN - 1939-3555
VL - 25
SP - 197
EP - 212
JO - Information Security Journal
JF - Information Security Journal
IS - 4-6
ER -