skip to main content
research-article

A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living

Published: 06 December 2021 Publication History

Abstract

Edge computing is an emerging technology for the acquisition of Internet-of-Things (IoT) data and provisioning different services in connected living. Artificial Intelligence (AI) powered edge devices (edge-AI) facilitate intelligent IoT data acquisition and services through data analytics. However, data in edge networks are prone to several security threats such as external and internal attacks and transmission errors. Attackers can inject false data during data acquisition or modify stored data in the edge data storage to hamper data analytics. Therefore, an edge-AI device must verify the authenticity of IoT data before using them in data analytics. This article presents an IoT data authenticity model in edge-AI for a connected living using data hiding techniques. Our proposed data authenticity model securely hides the data source’s identification number within IoT data before sending it to edge devices. Edge-AI devices extract hidden information for verifying data authenticity. Existing data hiding approaches for biosignal cannot reconstruct original IoT data after extracting the hidden message from it (i.e., lossy) and are not usable for IoT data authenticity. We propose the first lossless IoT data hiding technique in this article based on error-correcting codes (ECCs). We conduct several experiments to demonstrate the performance of our proposed method. Experimental results establish the lossless property of the proposed approach while maintaining other data hiding properties.

References

[1]
Nasir Abbas, Yan Zhang, Amir Taherkordi, and Tor Skeie. 2017. Mobile edge computing: A survey. IEEE Internet of Things Journal 5, 1 (2017), 450–465.
[2]
Alsharif Abuadbba and Ibrahim Khalil. 2015. Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings. Information Systems 53 (2015), 224–236.
[3]
Alsharif Abuadbba and Ibrahim Khalil. 2017. Walsh–Hadamard-based 3-D steganography for protecting sensitive information in point-of-care. IEEE Transactions on Biomedical Engineering 64, 9 (2017), 2186–2195.
[4]
Sharif Abuadbba, Ayman Ibaida, and Ibrahim Khalil. 2019. IoTSign: Protecting privacy and authenticity of IoT using discrete cosine based steganography. CoRR abs/1911.00604 (2019). arXiv:1911.00604. http://arxiv.org/abs/1911.00604.
[5]
Mamta Agiwal, Navrati Saxena, and Abhishek Roy. 2019. Towards connected living: 5G enabled Internet of Things (IoT). IETE Technical Review 36, 2 (2019), 190–202.
[6]
Donovan Artz. 2001. Digital steganography: Hiding data within data. IEEE Internet Computing 5, 3 (2001), 75–80.
[7]
Muhammad Asad, Junaid Gilani, and Adnan Khalid. 2011. An enhanced least significant bit modification technique for audio steganography. In 2011 International Conference on Computer Networks and Information Technology (ICCNIT’11). IEEE, 143–147.
[8]
Mrinmoy Barua, Md Shamsul Alam, Xiaohui Liang, and Xuemin Shen. 2011. Secure and quality of service assurance scheduling scheme for WBAN with application to ehealth. In 2011 IEEE Wireless Communications and Networking Conference. IEEE, 1102–1106.
[9]
Chi-Kwong Chan and Lee-Ming Cheng. 2004. Hiding data in images by simple LSB substitution. Pattern Recognition 37, 3 (2004), 469–474.
[10]
Zheng Chang, Lei Lei, Zhenyu Zhou, Shiwen Mao, and Tapani Ristaniemi. 2018. Learn to cache: Machine learning for network edge caching in the big data era. IEEE Wireless Communications 25, 3 (2018), 28–35.
[11]
Shuo-Tsung Chen, Yuan-Jie Guo, Huang-Nan Huang, Woon-Man Kung, Kuo-Kun Tseng, and Shu-Yi Tu. 2014. Hiding patients confidential datainthe ECG signal viaa transform-domain quantization scheme. Journal of Medical Systems 38, 6 (2014), 1–8.
[12]
Nedeljko Cvejic and Tapio Seppanen. 2002. Increasing the capacity of LSB-based audio steganography. In 2002 IEEE Workshop on Multimedia Signal Processing. IEEE, 336–338.
[13]
Abdur Forkan, Ibrahim Khalil, and Zahir Tari. 2014. CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living. Future Generation Computer Systems 35 (2014), 114–127. DOI:https://doi.org/10.1016/j.future.2013.07.009
[14]
Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Ayman Ibaida, and Zahir Tari. 2017. BDCaM: Big data for context-aware monitoring - A personalized knowledge discovery framework for assisted healthcare. IEEE Transactions on Cloud Computing 5, 4 (2017), 628–641. DOI:
[15]
Peter Gilbert, Jaeyeon Jung, Kyungmin Lee, Henry Qin, Daniel Sharkey, Anmol Sheth, and Landon P. Cox. 2011. Youprove: Authenticity and fidelity in mobile sensing. In Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems. 176–189.
[16]
Ary L. Goldberger, Luis A. N. Amaral, Leon Glass, Jeffrey M. Hausdorff, Plamen Ch. Ivanov, Roger G. Mark, Joseph E. Mietus, George B. Moody, Chung-Kang Peng, and H. Eugene Stanley. 2000. PhysioBank, PhysioToolkit, and PhysioNet. Circulation 101, 23 (2000), e215–e220. DOI:arXiv:http://circ.ahajournals.org/content/101/23/e215.full.pdf.
[17]
Cheng Guo, Chin-Chen Chang, and Zhi-Hui Wang. 2012. A new data hiding scheme based on DNA sequence. International Journal of Innovative Computing and Information Control 8, 1 (2012), 139–149.
[18]
Richard W. Hamming. 1950. Error detecting and error correcting codes. Bell Labs Technical Journal 29, 2 (1950), 147–160.
[19]
Sheng Dun Hu et al. 2011. A novel video steganography based on non-uniform rectangular partition. In 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE’11). IEEE, 57–61.
[20]
Ayman Ibaida and Ibrahim Khalil. 2013. Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Transactions on Biomedical Engineering 60, 12 (2013), 3322–3330.
[21]
Ayman Ibaida, Ibrahim Khalil, and Dhiah Al-Shammary. 2010. Embedding patients confidential data in ECG signal for healthcare information systems. In 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology. IEEE, 3891–3894.
[22]
S. Edward Jero, Palaniappan Ramu, and S. Ramakrishnan. 2015. ECG steganography using curvelet transform. Biomedical Signal Processing and Control 22 (2015), 161–169.
[23]
Eugenijus Kaniusas and Eugenijus Kaniusas. 2012. Fundamentals of biosignals. Biomedical Signals and Sensors I: Linking Physiological Phenomena and Biosignals (2012), 1–26.
[24]
Amal Khalifa and Ahmed Atito. 2012. High-capacity DNA-based steganography. In 2012 8th International Conference on Informatics and Systems (INFOS’12). IEEE, BIO–76.
[25]
Nan Li. 2010. Research on Diffie-Hellman key exchange protocol. In 2010 2nd International Conference on Computer Engineering and Technology, Vol. 4. IEEE, V4–634.
[26]
Xin Li, Huazhe Wang, Ye Yu, and Chen Qian. 2017. An IoT data communication framework for authenticity and integrity. In 2017 IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation (IoTDI’17). IEEE, 159–170.
[27]
Li Liu, Sammy Chan, Guangjie Han, Mohsen Guizani, and Masaki Bandai. 2018. Performance modeling of representative load sharing schemes for clustered servers in multiaccess edge computing. IEEE Internet of Things Journal 6, 3 (2018), 4880–4888.
[28]
Vu Mai, Ibrahim Khalil, and Ayman Ibaida. 2013. Steganography-based access control to medical data hidden in electrocardiogram. In 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2013, Osaka, Japan, July 3–7, 2013. 1302–1305. https://doi.org/10.1109/EMBC.2013.6609747
[29]
Ban Ahmed Mitras and Adeeba Kh Aboo. 2013. Proposed steganography approach using DNA properties. International Journal of Information Technology and Business Management 14, 1 (2013), 96–102.
[30]
Khan Muhammad, Rafik Hamza, Jamil Ahmad, Jaime Lloret, Haoxiang Wang, and Sung Wook Baik. 2018. Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Transactions on Industrial Informatics 14, 8 (2018), 3679–3689. DOI:
[31]
Marek R. Ogiela and Urszula Ogiela. 2012. DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management 32, 2 (2012), 175–181. DOI:
[32]
Michael L. Overton. 2001. Numerical Computing with IEEE Floating Point Arithmetic. SIAM.
[33]
Shabir A. Parah, Farhana Ahad, Javaid A. Sheikh, and Ghulam Mohiuddin Bhat. 2017. Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. Journal of Biomedical Informatics 66 (2017), 214–230.
[34]
Shabir A. Parah, Javaid A. Sheikh, Jahangir A. Akhoon, and Nazir A. Loan. 2018. Electronic health record hiding in images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Future Generation Computer Systems 108 (2018), 935–949.
[35]
Lip Yee Por, KokSheik Wong, and Kok Onn Chee. 2012. UniSpaCh: A text-based data hiding method using unicode space characters. Journal of Systems and Software 85, 5 (2012), 1075–1082.
[36]
Mohammad Saidur Rahman, Ibrahim Khalil, and Xun Yi. 2019. A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems. International Journal of Information Management 45 (2019), 276–288.
[37]
Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, and Hai Dong. 2017. Highly imperceptible and reversible text steganography using invisible character based codeword. In 21st Pacific Asia Conference on Information Systems (PACIS’17). AIS Electronic Library (AISeL), 1–13.
[38]
Palaniappan Ramu, Ramakrishnan Swaminathan, et al. 2016. Imperceptibility-robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization. Expert Systems with Applications 49 (2016), 123–135.
[39]
Chunming Rong and Erdal Cayirci. 2009. Chapter 11 - Wireless network security. In Computer and Information Security Handbook, John R. Vacca (Ed.). Morgan Kaufmann, Boston, 169–182.
[40]
Muhammad Sajjad, Khan Muhammad, Sung Wook Baik, Seungmin Rho, Zahoor Jan, Sang-Soo Yeo, and Irfan Mehmood. 2017. Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimedia Tools and Applications 76, 3 (2017), 3519–3536.
[41]
Esra Satir and Hakan Isik. 2012. A compression-based text steganography method. Journal of Systems and Software 85, 10 (2012), 2385–2394.
[42]
Esra Satir and Hakan Isik. 2014. A Huffman compression based text steganography method. Multimedia Tools and Applications 70, 3 (2014), 2085–2110.
[43]
Mahadev Satyanarayanan. 2017. The emergence of edge computing. Computer 50, 1 (2017), 30–39.
[44]
Ian Sinclair. 2011. Chapter 11 - Counting and correcting. In Electronics Simplified (3rd ed.), Ian Sinclair (Ed.). Newnes, Oxford, 203–221.
[45]
Mansi S. Subhedar and Vijay H. Mankar. 2014. Current status and key issues in image steganography: A survey. Computer Science Review 13 (2014), 95–113.
[46]
Fahim Sufi, Qiang Fang, Ibrahim Khalil, and Seedahmed S. Mahmoud. 2009. Novel methods of faster cardiovascular diagnosis in wireless telecardiology. IEEE Journal on Selected Areas in Communications 27, 4 (2009), 537–552. DOI:https://doi.org/10.1109/JSAC.2009.090515
[47]
Fahim Sufi and Ibrahim Khalil. 2009. A new feature detection mechanism and its application in secured ECG transmission with noise masking. Journal of Medical Systems 33, 2 (2009), 121–132. DOI:https://doi.org/10.1007/s10916-008-9172-6
[48]
Fahim Sufi, Ibrahim Khalil, and Ibrahim Habib. 2011. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients. Security and Communication Networks 4, 11 (2011), 1351–1368. DOI:https://doi.org/10.1002/sec.262
[49]
Fahim Sufi, Ibrahim Khalil, and Abdun Naser Mahmood. 2011. A clustering based system for instant detection of cardiac abnormalities from compressed ECG. Expert Systems with Applications 38, 5 (2011), 4705–4713. DOI:https://doi.org/10.1016/j.eswa.2010.08.149
[50]
Fahim Sufi, Ibrahim Khalil, and Abdun Naser Mahmood. 2011. Compressed ECG biometric: A fast, secured and efficient method for identification of CVD patient. Journal of Medical Systems 35, 6 (2011), 1349–1358. DOI:https://doi.org/10.1007/s10916-009-9412-4
[51]
Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, and Mohammed Atiquzzaman. 2018. Fast and peer-to-peer vital signal learning system for cloud-based healthcare. Future Generation Computer Systems 88 (2018), 220–233. DOI:
[52]
Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, and Mohammed Atiquzzaman. 2019. Collaborative extreme learning machine with a confidence interval for P2P learning in healthcare. Computer Networks 149 (2019), 127–143. DOI:
[53]
Changyong Xu, Xijian Ping, and Tao Zhang. 2006. Steganography in compressed video stream. In 1st International Conference on Innovative Computing, Information and Control, 2006 (ICICIC’06). Vol. 1. IEEE, 269–272.
[54]
Jun Zhou, Zhenfu Cao, Xiaolei Dong, and Xiaodong Lin. 2015. Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions. IEEE Wireless Communications 22, 2 (2015), 136–144.
[55]
Guangxu Zhu, Dongzhu Liu, Yuqing Du, Changsheng You, Jun Zhang, and Kaibin Huang. 2020. Toward an intelligent edge: Wireless communication meets machine learning. IEEE Communications Magazine 58, 1 (2020), 19–25.

Cited By

View all
  • (2024)Combining multi-agent systems and Artificial Intelligence of Things: Technical challenges and gainsInternet of Things10.1016/j.iot.2024.101364(101364)Online publication date: Sep-2024
  • (2024)Edge-AI Addresses the Big Data Challenges of IoT in the Cloud EdgeInnovative Technologies in Intelligent Systems and Industrial Applications10.1007/978-3-031-71773-4_11(171-180)Online publication date: 30-Dec-2024
  • (2023)Combination of Artificial Intelligence with Mergers and AcquisitionsBCP Business & Management10.54691/bcpbm.v39i.406939(235-241)Online publication date: 22-Feb-2023
  • Show More Cited By

Index Terms

  1. A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 22, Issue 3
      August 2022
      631 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3498359
      • Editor:
      • Ling Liu
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 06 December 2021
      Accepted: 01 February 2021
      Revised: 01 December 2020
      Received: 01 October 2020
      Published in TOIT Volume 22, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Edge-AI
      2. data authenticity
      3. lossless data hiding
      4. reversible IoT steganography
      5. connected living

      Qualifiers

      • Research-article
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)73
      • Downloads (Last 6 weeks)7
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Combining multi-agent systems and Artificial Intelligence of Things: Technical challenges and gainsInternet of Things10.1016/j.iot.2024.101364(101364)Online publication date: Sep-2024
      • (2024)Edge-AI Addresses the Big Data Challenges of IoT in the Cloud EdgeInnovative Technologies in Intelligent Systems and Industrial Applications10.1007/978-3-031-71773-4_11(171-180)Online publication date: 30-Dec-2024
      • (2023)Combination of Artificial Intelligence with Mergers and AcquisitionsBCP Business & Management10.54691/bcpbm.v39i.406939(235-241)Online publication date: 22-Feb-2023
      • (2023)Security and Privacy on 6G Network Edge: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2023.324467425:2(1095-1127)Online publication date: 1-Apr-2023

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media