IoT Security Using Steganography

IoT Security Using Steganography

Atrayee Majumder Ray, Anindita Sarkar, Ahmed J. Obaid, Saravanan Pandiaraj
Copyright: © 2021 |Pages: 20
DOI: 10.4018/978-1-7998-7160-6.ch009
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet of things (IoT) is one of those emerging technologies, which are going to rule the world in the next few decades. Due to the advancement of low-cost computing systems and mobile technologies, these physical things are now capable of sharing and collecting data with minimal human interference. However, these devices are exposed to various security threats regarding privacy and data confidentiality as they are openly accessible to all in the network. Moreover, many IoT devices have low processing power and weak security level which could be the main targets for hackers. Lightweight cryptographic schemes are used to meet the security needs in IoT environment. Steganography is used as another security tool for IoT devices. This chapter is an attempt to analyze the various steganography techniques used to strengthen the security needs of IoT devices as per their applications. IoT security schemes using different steganography models and algorithms are outlined here with their relative advantages and disadvantages.
Chapter Preview
Top

I Introduction

In recent times IoT plays an important and crucial part in the domain of information and communication technology. Internet Of Things is a scheme of dissimilar components which are linked over internet and each having unique identifier. These connected devices or ‘things’ which are also called the smart objects(ex IP cameras) are implanted with different software and sensors having computing ability those are able to collect and exchange data without human interference with other devices or systems over the internet. The number of such connected devices is increasing every day and there is an estimation that the number would exceed 25 million within a year. These devices include medical devices, household appliances, smart TVs, IP cameras, vehicles, electric meters and controls, traffic controls, street lights as well as digital assistants like Amazon Alexa and Google Home. The connectivity of these devices now not only restricted to the traditional end users such as mainframes, desktops and laptops but also expanded to hand hold smart phones and tablets. As a result use of these IoT devices has enormously increased in our daily life and that’s why there is an enhanced requirement to scrutiny the security issues of IoT devices. It is really a very challenging task to maintain the data security in IoT. It should not be neglected specially in case of home appliances, smart televisions, IP cameras, remote health monitoring etc where there is a lack of confidentiality and could be easily hacked (Atamli & Martin, 2014). Due to the significant improvement of computing facility several vulnerabilities and threats have occurred for IoT devices which led to implement strong security systems for them.From the security threats of view IOT devices were amongst the top five in 2015 (Bradley, 2015). However, IoT devices have the limitations of having lower battery capacity, less computing power and less memory. Due to this resource constrained environment, traditional strong cryptographic models would not work for it. Lightweight cryptographic models may be a solution. Researchers are still looking for alternative solutions. It is found that Steganography may be a good solution for specific IoT applications. The main focus of this section is to investigate the different ways to achieve security in IoT devices using Steganography.

Complete Chapter List

Search this Book:
Reset