Abstract
Smart home is an emerging form of the Internet of things (IoT), which can enable people to master the conditions of their smart homes remotely. However, privacy leaking in smart home network is neglected. Therefore, it is strongly necessary to design a secure and effective scheme to ensure the privacy protection of the smart home network. Considering the privacy leaking in the smart home network system, this paper proposes a scheme combining encryption and information hiding to ensure the security of data transmission. In the scheme, the sensitive data are encrypted to ciphertext before it is transmitted, and then the ciphertext is embedded into the Least Significant Bit (LSB) of the cover image. On the receiving terminal, the ciphertext can be extracted from the stego image, then the ciphertext is decrypted into the sensitive data. Comparing to the method of using encryption algorithm merely, the scheme greatly improved the security of data transmission, making it more suitable for the real environment.
Supported by the Nature Science Foundation with No. 61862005, the Guangxi Nature Science Foundation with No. 2017GXNSFBA198226, the Scientific Research Foundation of Guangxi University with No. XGZ160483, the Higher Education Undergraduate Teaching Reform Project of Guangxi with No. 2017JGB108, and the project with No. DD3070051008.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Santoso, F.K., Vun, N.C.H.: Securing IoT for smart home system. In: 2015 International Symposium on Consumer Electronics (ISCE), Madrid, pp. 1–2. IEEE (2015)
Li, S., Xu, L.D., Zhao, S.: 5G Internet of Things: a survey. J. Ind. Inf. Integr. 10, 99–110 (2016)
Yadav, P., Mittal, A., Yadav, H.: IoT: challenges and issues in Indian perspective. In: 3rd International Conference on Internet Things (IoT-SIU), New Delhi, pp. 1–15. IEEE (2018)
Qiu, T.: The main scheme analysis of smart home network control system. Innov. Appl. Sci. Technol. 10(20), 80–90 (2016)
Nobakht, M., Sivaraman, V., Boreli, R.: A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, pp. 147–156. IEEE (2015)
Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. ACM Trans. Sensor Netw. 9(3), 1–23 (2013)
Zhang, J.: Application research of chaos encryption in intelligent home data transmission system. M.S. thesis, Hangzhou Electronic Science and Technology University, Hangzhou, China (2015)
She, W., Gu, Z., Lyu, X., Liu, Q., Tian, Z., Liu, W.: Homomorphic consortium blockchain for smart home system sensitive data privacy preserving. IEEE Access 7, 62058–62070 (2019)
Yang, J.: Research on security enhancement of information hiding in sensor networks. M.S. thesis, Hunan University, Changsha, China (2011)
Halpern, J.Y., O’Neill, K.R.: Anonymity and information hiding in multi-agent systems. J. Comput. Secur. 13(3), 483–514 (2005)
Sharp, T.: An implementation of key-based digital signal steganography. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 13–26. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45496-9_2
Luo, F.: Adaptive steganographic analysis of gray image LSB algorithm. M.S. thesis, Xidian university, Xi’an, China (2013)
Deng, M.: Research on high capacity reversible information hiding algorithm based on encrypted image. M.S. thesis, Southwest Jiaotong University, Chengdu, China (2018)
Zhu, J.: Research and implementation of QR code anti-counterfeiting algorithm based on DES improved algorithm. M.S. thesis, Shanxi University of Science and Technology, Taiyuan, China (2018)
Cheng, Z., Chen, C., Qiu, X.: Cache timing attack based on Flush+Reload DES algorithm. Comput. Eng. 44(12), 163–167 (2018)
Wei-Xing, Q., Qin, L.I., Jin-Lian, X.U.: A combination algorithm based on DES. J. Nanjing Univ. Posts Telecommun. 31(5), 83–86 (2011)
Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254–264 (2016)
Spreitzer, R., Moonsamy, V., Korak, T., Mangard, S.: Systematic classification of side-channel attacks: a case study for mobile devices. IEEE Commun. Surv. Tutor. 20(1), 465–488 (2018)
Acknowledgment
This work is financially supported by the Nature Science Foundation with No. 61862005, the Guangxi Nature Science Foundation with No. 2017GXNSFBA198226, the Scientific Research Foundation of Guangxi University with No. XGZ160483, the Higher Education Undergraduate Teaching Reform Project of Guangxi with No. 2017JGB108, and the project with No. DD3070051008.
Special thanks to Dr Lina Yang for her careful guidance on the paper writing, and thanks to Miss Xiaocui Dang for her help in the paper writing.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Deng, H., Yang, L., Dang, X., Tang, Y.Y., Wang, P. (2020). Secure Data Transmission of Smart Home Networks Based on Information Hiding. In: Lu, Y., Vincent, N., Yuen, P.C., Zheng, WS., Cheriet, F., Suen, C.Y. (eds) Pattern Recognition and Artificial Intelligence. ICPRAI 2020. Lecture Notes in Computer Science(), vol 12068. Springer, Cham. https://doi.org/10.1007/978-3-030-59830-3_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-59830-3_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59829-7
Online ISBN: 978-3-030-59830-3
eBook Packages: Computer ScienceComputer Science (R0)