Secure Framework Data Security Using Cryptography and Steganography in Internet of Things

Secure Framework Data Security Using Cryptography and Steganography in Internet of Things

Kannadhasan S., R. Nagarajan
Copyright: © 2021 |Pages: 21
DOI: 10.4018/978-1-7998-7160-6.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The exponential development of the internet and the internet of things (IoT) applies to the next step of the information transition, which entails billions of integrated smart devices and sensors to enable the speedy sharing of information and data under soft real-time restrictions. Significant improvements in data sharing also sparked the digital information movement. This transmission of data can include private, reliable, and often private communication. The exponential development of the internet and the internet of things (IoT) applies to the next step of the information transition, which entails billions of integrated smart devices and sensors to enable the speedy sharing of information and data under soft real-time restrictions. Significant improvements in data sharing also sparked the digital information movement. This transmission of data can include private, reliable, and often private communication.
Chapter Preview
Top

2. Internet Of Things

These IoT attacks and risks need to be taken into consideration in order to provide consumer data with protection and privacy. IoT production is primarily focused on resolving security issues. The sensor node detects the data that has passed through the LAN to cloud storage. Data would be allowed utilizing the authorization server before saving data for cloud storage. By attacking the LAN, the attacker will eavesdrop the details. Due to its heterogeneity and wide collection of interconnected devices, ensuring protection for the IoT ecosystem is a daunting job. You may group the attacks against IoT into four groups. There are physical threats, network attacks, attacks on devices, and attacks on cryptography. While the internet is the most consistent platform for the dissemination of sensitive details, the absence of infrastructure that concerns computer hackers makes for malicious activities. In comparison, numerous existing encryption algorithms are currently found to be fragile. Also with the protection offered by recent encryption technology, by the brute force attack method and dictionary or rainbow table attack, hackers always disrupt the hidden letter. In order to escape these assaults, one would need to move details inconspicuously. Steganography is a known technique for the sensitive transmission of results.

Complete Chapter List

Search this Book:
Reset