As the Internet of Things (IoT) becomes more widely used, the danger of information leakage, the danger of information leakage, data leakage and theft of the internet of things is continuous increasing, as the communication channel for data transfer is open to the public. A considerable portion of this data includes sensitive and personal information for the user and the company as well. Because of the openness, distributed nature, and lack of control over the entire IoT environment, the number of attack vectors for bad users is significant. End-users must trust the system for the IoT to become a viable service platform. Consequently, in critical infrastructures like smart home, smart city, smart healthcare, and smart industry, information security and privacy are the major concern in the Internet of Things. In this paper, we present an information concealment strategy using steganography to protect communication in critical IoT infrastructure. RGB photographs are employed as the information carrier. Deep layers of low-distortion image channels in the least significant bit (LSB) are used to hide the data to be used as a data marker. Both mathematically and experimentally, we evaluate our method. We display mathematically that the striker's analysis cannot expect the current information. The proposed strategy outperformed previous strategies in terms of imperceptibility and capacity, as well as resilience to steganalysis attacks like histogram analysis, as demonstrated experimentally.
CITATION STYLE
Abdulkadhim, E. G., Al-Shemarry, M. S., & Alsaadi, E. M. T. A. (2024). An efficient algorithm for covert contacting in IoT. In AIP Conference Proceedings (Vol. 3097). American Institute of Physics. https://doi.org/10.1063/5.0209934
Mendeley helps you to discover research relevant for your work.