Skip to main content
Top

2019 | OriginalPaper | Chapter

Security in ZigBee Using Steganography for IoT Communications

Authors : Iqra Hussain, Mukesh Chandra Negi, Nitin Pandey

Published in: System Performance and Management Analytics

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

ZigBee is an IEEE 802.15.4-sourced arrangement for a suite of high-level communication protocols employed to generate personal area networks. ZigBee is a less price, low-complex and low power consumption wireless personal area network (WPAN) norm that targets at the extensive developments of instruments and devices with prolonged battery life that are employed in wireless controls or applications that are used for monitoring purposes. It has an extensive utilization in industries and operations that are conducted physically. Hence, ZigBee is mostly correlated with IoT and M2M. Therefore, security in these WPANs becomes a major interest and has gained a good amount of notice currently. The security methods used in these networks over a period of time usually include practices that are cryptographic in nature. Then again these practices recommended till date can have good scopes of improvements, as a result, to turn up with additional assured and protected data communication. The chapter proposes a technique to enhance security in ZigBee using steganography over the secret data being communicated between communicating parties. However in cryptographic practices, the message even if it stands strongly resilient, can stimulate doubts and, therefore, could be adequate enough for a third party, spying the systems that something that are of significant use have been exposed. Hence, to keep the security features consistent in these networks this chapter proposes a technique to protect data by means of Steganography over the data to be communicated, this allows two communicating parties to transmit covert communication through a shared route in a way with the purpose, no adversary can even discover as in the covert communication is being transferred. Hence, making use of cryptographic practices helps protecting the insides of the messages only, on the other hand using steganographic practices can help in protecting the message contents and even the fact that a covert message has been transferred. The exclusive plan is to come up with a practice that is Steganographic in nature and ultimately has a resistance to any sort of steganalysis.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Mahmood, N. R., Kufa University Education College, Azeez, A. A., Mohammad Kufa University Education College, & Rasool, Z. N., Kufa University Sciences College. Public key steganography. Mahmood, N. R., Kufa University Education College, Azeez, A. A., Mohammad Kufa University Education College, & Rasool, Z. N., Kufa University Sciences College. Public key steganography.
3.
go back to reference Martins, D., Guyennet, H., & Computer Science Department LIFC, University of Franche-Comte Beasancon. Steganography in MAC layers of 802.15.4 protocol for securing wireless sensor networks. Martins, D., Guyennet, H., & Computer Science Department LIFC, University of Franche-Comte Beasancon. Steganography in MAC layers of 802.15.4 protocol for securing wireless sensor networks.
4.
go back to reference Handel, T. G., & Sanford II, M. T. Hiding data in the OSI network model. In Proceedings of the First International Workshop on Information Hiding, (London, UK) (23–38). Springer. Handel, T. G., & Sanford II, M. T. Hiding data in the OSI network model. In Proceedings of the First International Workshop on Information Hiding, (London, UK) (23–38). Springer.
5.
go back to reference Trabelsi, Z., El Sayed, H., Frikha, L., & Rabie, T. (2007). A novel covert channel based on the IP header record route option. International Journal of Advanced Media and Communication, 1(4), 328–350.CrossRef Trabelsi, Z., El Sayed, H., Frikha, L., & Rabie, T. (2007). A novel covert channel based on the IP header record route option. International Journal of Advanced Media and Communication, 1(4), 328–350.CrossRef
6.
go back to reference Murdoch, S. J., & Lewis, S. (2005). Embedding covert channels into TCP/IP. In Information hiding: 7th international workshop, volume 3727 of LNCS (pp. 247–261). Murdoch, S. J., & Lewis, S. (2005). Embedding covert channels into TCP/IP. In Information hiding: 7th international workshop, volume 3727 of LNCS (pp. 247–261).
7.
go back to reference Backes, M., Cachin, C., & IBM Research, Zurich Research Laboratory, CH-8803 Rüschlikon, Switzerland. Public-key steganography with active attacks. Backes, M., Cachin, C., & IBM Research, Zurich Research Laboratory, CH-8803 Rüschlikon, Switzerland. Public-key steganography with active attacks.
8.
go back to reference Ahmad, A. W., Hanyang University, Ansan, South Korea, Jan, N., Iqbal, S., & Lee, C. Implementation of ZigBee-GSM based home security monitoring and remote control system. Ahmad, A. W., Hanyang University, Ansan, South Korea, Jan, N., Iqbal, S., & Lee, C. Implementation of ZigBee-GSM based home security monitoring and remote control system.
9.
go back to reference Sun, M., School of Electronics & Information Engineering, Tongji University, Shanghai, Liu, Q., & Jiang, M. An implementation of remote lighting control system based on ZigBee technology and SoC solution. Sun, M., School of Electronics & Information Engineering, Tongji University, Shanghai, Liu, Q., & Jiang, M. An implementation of remote lighting control system based on ZigBee technology and SoC solution.
10.
go back to reference Anuradha, P., Network Engineering, Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai, India, & Sendhilkumar, R. Design and implementation of ZigBee-RFID based vehicle tracking. Anuradha, P., Network Engineering, Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai, India, & Sendhilkumar, R. Design and implementation of ZigBee-RFID based vehicle tracking.
11.
go back to reference Han, D.-M., School of Computer Science & Engineering, Kongju National University, Kongju, South Korea, & Lim, J.-H. Design and implementation of smart home energy management systems based on ZigBee. Han, D.-M., School of Computer Science & Engineering, Kongju National University, Kongju, South Korea, & Lim, J.-H. Design and implementation of smart home energy management systems based on ZigBee.
Metadata
Title
Security in ZigBee Using Steganography for IoT Communications
Authors
Iqra Hussain
Mukesh Chandra Negi
Nitin Pandey
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7323-6_18

Premium Partner