Abstract

Internet of things (IoT) has been developed and applied rapidly because of its huge commercial value in recent years. However, security problem has become a key factor restricting the development of IoT. The nodes of IoT are easy to be impersonated or replaced when attacked, which leads to the mistake of the uploaded data, the abnormal use of the application, and so on. Identifying the authenticity of the data submitted by the nodes is the top priority. We propose a scheme to verify the authenticity of multinode data. In this scheme, the authenticity of node data is checked through visual secret recovery and XOR operation together. The least significant bit (lsb) operation converts data from nodes into a bit, which improves the efficiency of data verification and reduces the risk of data leakage. This scheme achieves the purpose of verifying the data provided by the node, which avoids malicious attacks from illegal nodes. By analyzing the experiment result and comparing with other works, our scheme has the advantages of high verification efficiency, lightweight storage of nodes, and security verification.

Highlights

  • IOT (Internet of things) is a network based on information carriers such as the Internet and traditional telecommunications networks, allowing all ordinary physical objects that can be independently addressed to achieve interconnection [1]

  • Internet of things (IoT) adopts the form of connecting things, it must rely on Internet technologies such as computer communication and information transmission. erefore, in the IoT environment, there are security risks such as technical security issues, signal interference, malicious intrusion, and communication

  • We propose a scheme combining the traditional secret image-sharing scheme (SISS) with visual secret sharing

Read more

Summary

Introduction

IOT (Internet of things) is a network based on information carriers such as the Internet and traditional telecommunications networks, allowing all ordinary physical objects that can be independently addressed to achieve interconnection [1]. Encryption algorithm, information hiding, and secret sharing have been used in the field of image security [15,16,17]. With the secret image-sharing scheme (SISS) widely used, share authentication has become especially important. Each participant in the scheme can verify the authenticity of the share; in addition, it will not cause any leakage of the original secret and share information. If the submitted data are found to be false, the secret recovery work will be stopped This scheme requires a large amount of information to be disclosed in advance, and there is a risk of information leakage.

Preliminaries
Motivation and Contributions
Secret Image-Sharing Scheme with Shares’ Verifiable
Algorithm 1
Algorithm 2
Experimental Results and Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call