Skip to main content

Secure Data Transmission of Smart Home Networks Based on Information Hiding

  • Conference paper
  • First Online:
Pattern Recognition and Artificial Intelligence (ICPRAI 2020)

Abstract

Smart home is an emerging form of the Internet of things (IoT), which can enable people to master the conditions of their smart homes remotely. However, privacy leaking in smart home network is neglected. Therefore, it is strongly necessary to design a secure and effective scheme to ensure the privacy protection of the smart home network. Considering the privacy leaking in the smart home network system, this paper proposes a scheme combining encryption and information hiding to ensure the security of data transmission. In the scheme, the sensitive data are encrypted to ciphertext before it is transmitted, and then the ciphertext is embedded into the Least Significant Bit (LSB) of the cover image. On the receiving terminal, the ciphertext can be extracted from the stego image, then the ciphertext is decrypted into the sensitive data. Comparing to the method of using encryption algorithm merely, the scheme greatly improved the security of data transmission, making it more suitable for the real environment.

Supported by the Nature Science Foundation with No. 61862005, the Guangxi Nature Science Foundation with No. 2017GXNSFBA198226, the Scientific Research Foundation of Guangxi University with No. XGZ160483, the Higher Education Undergraduate Teaching Reform Project of Guangxi with No. 2017JGB108, and the project with No. DD3070051008.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Santoso, F.K., Vun, N.C.H.: Securing IoT for smart home system. In: 2015 International Symposium on Consumer Electronics (ISCE), Madrid, pp. 1–2. IEEE (2015)

    Google Scholar 

  2. Li, S., Xu, L.D., Zhao, S.: 5G Internet of Things: a survey. J. Ind. Inf. Integr. 10, 99–110 (2016)

    Google Scholar 

  3. Yadav, P., Mittal, A., Yadav, H.: IoT: challenges and issues in Indian perspective. In: 3rd International Conference on Internet Things (IoT-SIU), New Delhi, pp. 1–15. IEEE (2018)

    Google Scholar 

  4. Qiu, T.: The main scheme analysis of smart home network control system. Innov. Appl. Sci. Technol. 10(20), 80–90 (2016)

    Google Scholar 

  5. Nobakht, M., Sivaraman, V., Boreli, R.: A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, pp. 147–156. IEEE (2015)

    Google Scholar 

  6. Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. ACM Trans. Sensor Netw. 9(3), 1–23 (2013)

    Article  Google Scholar 

  7. Zhang, J.: Application research of chaos encryption in intelligent home data transmission system. M.S. thesis, Hangzhou Electronic Science and Technology University, Hangzhou, China (2015)

    Google Scholar 

  8. She, W., Gu, Z., Lyu, X., Liu, Q., Tian, Z., Liu, W.: Homomorphic consortium blockchain for smart home system sensitive data privacy preserving. IEEE Access 7, 62058–62070 (2019)

    Article  Google Scholar 

  9. Yang, J.: Research on security enhancement of information hiding in sensor networks. M.S. thesis, Hunan University, Changsha, China (2011)

    Google Scholar 

  10. Halpern, J.Y., O’Neill, K.R.: Anonymity and information hiding in multi-agent systems. J. Comput. Secur. 13(3), 483–514 (2005)

    Article  Google Scholar 

  11. Sharp, T.: An implementation of key-based digital signal steganography. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 13–26. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45496-9_2

    Chapter  Google Scholar 

  12. Luo, F.: Adaptive steganographic analysis of gray image LSB algorithm. M.S. thesis, Xidian university, Xi’an, China (2013)

    Google Scholar 

  13. Deng, M.: Research on high capacity reversible information hiding algorithm based on encrypted image. M.S. thesis, Southwest Jiaotong University, Chengdu, China (2018)

    Google Scholar 

  14. Zhu, J.: Research and implementation of QR code anti-counterfeiting algorithm based on DES improved algorithm. M.S. thesis, Shanxi University of Science and Technology, Taiyuan, China (2018)

    Google Scholar 

  15. Cheng, Z., Chen, C., Qiu, X.: Cache timing attack based on Flush+Reload DES algorithm. Comput. Eng. 44(12), 163–167 (2018)

    Google Scholar 

  16. Wei-Xing, Q., Qin, L.I., Jin-Lian, X.U.: A combination algorithm based on DES. J. Nanjing Univ. Posts Telecommun. 31(5), 83–86 (2011)

    Google Scholar 

  17. Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254–264 (2016)

    Article  Google Scholar 

  18. Spreitzer, R., Moonsamy, V., Korak, T., Mangard, S.: Systematic classification of side-channel attacks: a case study for mobile devices. IEEE Commun. Surv. Tutor. 20(1), 465–488 (2018)

    Article  Google Scholar 

Download references

Acknowledgment

This work is financially supported by the Nature Science Foundation with No. 61862005, the Guangxi Nature Science Foundation with No. 2017GXNSFBA198226, the Scientific Research Foundation of Guangxi University with No. XGZ160483, the Higher Education Undergraduate Teaching Reform Project of Guangxi with No. 2017JGB108, and the project with No. DD3070051008.

Special thanks to Dr Lina Yang for her careful guidance on the paper writing, and thanks to Miss Xiaocui Dang for her help in the paper writing.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lina Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deng, H., Yang, L., Dang, X., Tang, Y.Y., Wang, P. (2020). Secure Data Transmission of Smart Home Networks Based on Information Hiding. In: Lu, Y., Vincent, N., Yuen, P.C., Zheng, WS., Cheriet, F., Suen, C.Y. (eds) Pattern Recognition and Artificial Intelligence. ICPRAI 2020. Lecture Notes in Computer Science(), vol 12068. Springer, Cham. https://doi.org/10.1007/978-3-030-59830-3_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59830-3_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59829-7

  • Online ISBN: 978-3-030-59830-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics