A Security Information Transmission Method Based on DHR for Seafloor Observation Network
Abstract
:1. Introduction
- We present a novel approach to safeguarding data transmission within a SON by utilizing a DHR framework. Our method’s simplicity and low computational complexity make it well-suited for deployment in SON devices with limited computational capabilities. To the best of our knowledge, this is the first instance of employing a DHR framework for this purpose;
- We introduce an active defense framework that uses dynamic key encryption to encrypt data blocks and generates heterogeneous data blocks during transmission. This method significantly increases the difficulty for attackers trying to decipher the information, as a single encrypted block is insufficient for interpretation, thus enhancing the overall security of data integrity;
- Experimental results provide evidence that the proposed framework effectively defends against data tampering and data-stealing attacks within a SON environment.
2. Background
2.1. Seafloor Observation Network
2.2. Security Risks in SONs
3. Related Works
3.1. Methods for Ensuring Data Integrity
3.2. DHR Architecture and Applications
4. Preliminaries
4.1. Notations and Problem Formulation
- Invertibility: For any , there exists a unique message such that and ;
- Redundancy: For any , where , there exists the encrypted information = ;
- Uniqueness: For any such that , then decoded information .
4.2. Security Assumptions
- Data tampering attack: Refers to unauthorized changes made to data blocks while they are being transmitted. This attack is considered successful if the attacker is able to modify the data without detection by the system;
- Data stealing attack: Occurs when attackers gain access to a network and steal sensitive data while it is in transit.
4.3. Motivation
5. Methodology
5.1. System Model
5.2. Application in SONs
5.2.1. Distribution Module
5.2.2. Encryption Module
- Horizontal strategy. For the data packet , we shuffle the columns of the data blocks using encryption parameters while keeping the rows of each data block. This forms an encrypted data packet , where data block will be translated to the position , where and satisfy the following conditions:
- Vertically translation strategy. The second shift strategy involves vertically translating the data blocks, where the columns of each block are preserved while the rows are shuffled using encryption parameters to produce the encrypted data packet . For a given data block in the stacked data packet D, it will be shifted to position , where and are determined based on following equation:
- Numerical strategy. This strategy involves using a parameter to add a translation offset to the binary representation of the numerical value of each data block in data packet . Since the information collected by the seabed observation sensor is comprised of 4-bit hexadecimal numbers, the data block in is transformed into using the following formula:
5.2.3. Decryption Module
Algorithm 1 The decryption process. |
|
5.3. Security Analysis
5.3.1. Tampering Packet
5.3.2. Data Theft
6. Implementation and Evaluation
6.1. Environmental Setup
6.2. Simulated Man-in-the-Middle
6.3. Security Analysis Metrics
6.4. Evaluation of Anti-Tampering Ability
6.5. Evaluation of Anti-Stealing Capability
6.6. Evaluation on Side-Channel Attacks
6.7. System Overhead Analysis
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Fenghua, L.; Yanguo, L.; Haibin, W.; Yonggang, G.; Fei, Z. Research progress and development trend of seafloor observation network. Bull. Chin. Acad. Sci. 2019, 34, 321–330. (In Chinese) [Google Scholar]
- Yu, Y.; Xu, H.; Xu, C. An object model for seafloor observatory sensor control in the east China sea. J. Mar. Sci. Eng. 2020, 8, 716. [Google Scholar] [CrossRef]
- Xie, H.; Yan, Z.; Yao, Z.; Atiquzzaman, M. Data collection for security measurement in wireless sensor networks: A survey. IEEE Internet Things J. 2018, 6, 2205–2224. [Google Scholar] [CrossRef]
- Xiao, H.; Zheng, B.; Isshiki, T.; Kunieda, H. Hybrid shared-memory and message-passing multiprocessor system-on-chip for UWB MAC layer. IET Comput. Digit. Tech. 2017, 11, 8–15. [Google Scholar] [CrossRef]
- Wazirali, R.; Ahmad, R.; Al-Amayreh, A.; Al-Madi, M.; Khalifeh, A. Secure watermarking schemes and their approaches in the IoT technology: An overview. Electronics 2021, 10, 1744. [Google Scholar] [CrossRef]
- Noh, J.; Jeon, S.; Cho, S. Distributed blockchain-based message authentication scheme for connected vehicles. Electronics 2020, 9, 74. [Google Scholar] [CrossRef]
- Bello, L.L.; Steiner, W. A perspective on ieee time-sensitive networking for industrial communication and automation systems. Proc. IEEE 2019, 107, 1094–1120. [Google Scholar] [CrossRef]
- Tsimbalo, E.; Fafoutis, X.; Piechocki, R.J. CRC error correction in IoT applications. IEEE Trans. Ind. Inform. 2016, 13, 361–369. [Google Scholar] [CrossRef]
- Wu, J. Cyberspace endogenous safety and security. Engineering 2022, 15, 179–185. [Google Scholar] [CrossRef]
- Pulvirenti, S.; Schmelling, J.-W.; D’Amico, A.; Giorgio, E.; Aurnia, S. Idmar infrastructure: The junction box and shore station optical network. In Proceedings of the 2022 IEEE International Workshop on Metrology for the Sea, Learning to Measure Sea Health Parameters (MetroSea), Milazzo, Italy, 3–5 October 2022; pp. 61–65. [Google Scholar]
- Hummelholm, A. Undersea optical cable network and cyber threats. In Proceedings of the European Conference on Information Warfare and Security, Academic Conferences International, Coimbra, Portugal, 4–5 July 2019; pp. 650–659. [Google Scholar]
- Eleftherakis, D.; Vicen-Bueno, R. Sensors to increase the security of underwater communication cables: A review of underwater monitoring sensors. Sensors 2020, 20, 737. [Google Scholar] [CrossRef]
- Bueger, C.; Liebetrau, T. Protecting hidden infrastructure: The security politics of the global submarine data cable network. Contemp. Policy 2021, 42, 391–413. [Google Scholar] [CrossRef]
- Rattan, A.K. Data integrity: History, issues, and remediation of issues. PDA J. Pharm. Sci. Technol. 2018, 72, 105–116. [Google Scholar] [CrossRef]
- Tan, C.B.; Hijazi, M.H.A.; Lim, Y.; Gani, A. A survey on proof of retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends. J. Netw. Comput. Appl. 2018, 110, 75–86. [Google Scholar] [CrossRef]
- Chen, B.; Curtmola, R.; Ateniese, G.; Burns, R. Remote data checking for network coding-based distributed storage systems. In Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, Chicago, IL, USA, 8 October 2010; pp. 31–42. [Google Scholar]
- Yu, Y.; Au, M.H.; Ateniese, G.; Huang, X.; Susilo, W.; Dai, Y.; Min, G. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 2016, 12, 767–778. [Google Scholar] [CrossRef]
- Ateniese, G.; Burns, R.; Curtmola, R.; Herring, J.; Khan, O.; Kissner, L.; Peterson, Z.; Song, D. Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 2011, 14, 1–34. [Google Scholar] [CrossRef]
- Gheorghiu, V.; Mosca, M. Benchmarking the quantum cryptanalysis of symmetric, public-key and hash-based cryptographic schemes. arXiv 2019, arXiv:1902.02332. [Google Scholar]
- Gowda, S.N. Innovative enhancement of the Caesar cipher algorithm for cryptography. In Proceedings of the 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Fall), Bareilly, India, 30 September–1 October 2016; pp. 327–330. [Google Scholar]
- Alenezi, M.N.; Alabdulrazzaq, H.; Mohammad, N.Q. Symmetric encryption algorithms: Review and evaluation study. Int. J. Commun. Netw. Inf. Secur. 2020, 12, 256–272. [Google Scholar]
- Adhie, R.P.; Hutama, Y.; Ahmar, A.S.; Setiawan, M. Implementation cryptography data encryption standard (DES) and triple data encryption standard (3DES) method in communication system based near field communication (NFC). J. Phys. Conf. Ser. 2018, 954, 012009. [Google Scholar]
- Abdullah, A.M. Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptogr. Netw. Secur. 2017, 16, 11. [Google Scholar]
- Alabaichi, A.; Ahmad, F.; Mahmod, R. Security analysis of blowfish algorithm. In Proceedings of the 2013 Second International Conference on Informatics & Applications (ICIA), Lodz, Poland, 23–25 September 2013; pp. 12–18. [Google Scholar]
- Ateniese, G.; Burns, R.; Curtmola, R.; Herring, J.; Kissner, L.; Peterson, Z.; Song, D. Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 31 October –2 November 2007; pp. 598–609. [Google Scholar]
- Yuan, J.; Yu, S. Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1717–1726. [Google Scholar] [CrossRef]
- Araghi, T.K.; Megías, D.; Rosales, A. Evaluation and analysis of reversible watermarking techniques in wsn for secure, lightweight design of iot applications: A survey. In Proceedings of the Advances in Information and Communication: 2023 Future of Information and Communication Conference (FICC), San Francisco, CA, USA, 2–3 March 2023; Volume 2, pp. 695–708. [Google Scholar]
- Al-Shayea, T.K.; Mavromoustakis, C.X.; Batalla, J.M.; Mastorakis, G.; Mukherjee, M.; Chatzimisios, P. Efficiency-aware watermarking using different wavelet families for the Internet of Things. In Proceedings of the ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- Ferdowsi, A.; Saad, W. Deep learning-based dynamic watermarking for secure signal authentication in the internet of things. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
- Wei, D.; Xiao, L.; Shi, L.; Yu, L. Mimic web application security technology based on dhr architecture. In Proceedings of the International Conference on Artificial Intelligence and Intelligent Information Processing (AIIIP 2022), Qingdao, China, 17–29 June 2022; Volume 12456, pp. 118–124. [Google Scholar]
- Yu, F.; Wei, Q.; Geng, Y.; Wang, Y. Research on key technology of industrial network boundary protection based on endogenous security. In Proceedings of the 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Chongqing, China, 18–20 June 2021; Volume 4, pp. 112–121. [Google Scholar]
- Tang, M. Research on edge network security technology based on DHR. In Proceedings of the 2022 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA), Dalian, China, 20–21 August 2022; pp. 614–617. [Google Scholar]
- Chen, L.; Miao, Y.; Yu, C.; Liu, S. CD-DAA-MD: A cross-domain DAA scheme with Mimic Defense for Internet of Vehicles. In Proceedings of the 2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS), Nanjing, China, 10–12 January 2023; pp. 139–146. [Google Scholar]
- Velasco, F.; Palomares, J.; Olivares, J. Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs. Comput. Netw. 2021, 199, 108470. [Google Scholar] [CrossRef]
- Park, S.-H.; Kim, J.-Y.; Cho, I.-J.; Hwang, B.-M. Redundancy management design for triplex flight control system. J. Korean Soc. Aeronaut. Space Sci. 2010, 38, 167–179. [Google Scholar]
- Navarro, J.; Deruyver, A.; Parrend, P. A systematic survey on multi-step attack detection. Comput. Secur. 2018, 76, 214–249. [Google Scholar] [CrossRef]
- Wu, Z.; Shu, M.; Shi, J.; Cao, Z.; Xu, F.; Li, Z.; Xiong, G.; Yiu, S. How to reverse engineer ICS protocols using pair-HMM. In Information and Communication Technology for Intelligent Systems: Proceedings of ICTIS 2018; Springer: Singapore, 2019; Volume 2, pp. 115–125. [Google Scholar]
- Abdulnabi, M.S.; Ahmed, H. Design of efficient cyclic redundancy check-32 using FPGA. In Proceedings of the 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), Khartoum, Sudan, 12–14 August 2018; pp. 1–5. [Google Scholar]
Notations | Descriptions |
---|---|
The i-th encryption function | |
The i-th decryption function | |
The set of all the plain text | |
The set of all the ciphertext | |
I | Plain text to be sent |
Ciphertext received |
Name | Model | Function | Configuration |
---|---|---|---|
METS Sensor | Franatech Classic METS [Reppenstedt, Germany] | Methane inspection | Measurement range of 50 nMol/L to 10 μMol/L |
CTD Sensor | SAIV AS SD204 [Bergen, Norway] | Record seawater conductivity, salinity, temperature, depth, and sound speed (water density) | Salinity range: 0–40 ppt, Temperature range: −2–40 °C, Depth range: 500–6000 m |
DO Sensor | Edaphic ES-O2-DW [Moorabbin, Australia] | Measure the oxygen in gas | Oxygen range: 0–20 mg/L |
Raspberry Pi | Raspberry Pi 3 Model B [Shenzhen, China] | Simulate a junction box for encrypting collected sensor data | CPU: 64-bit quad-core, ARM Cortex-A53, Memory: 1 GB |
Server | ThinkSystem SR558H [Beijing, China] | Simulate the operations center and onshore station to encrypt the information | CPU: Hygon C86 5280, Memory: 32 GB |
Router | LS1008G V2 [Shenzhen, China] | Provide basic network topology | 8 Ports, 10/100/1000 Mbps |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ying, F.; Zhao, S.; Wang, J. A Security Information Transmission Method Based on DHR for Seafloor Observation Network. Sensors 2024, 24, 1147. https://doi.org/10.3390/s24041147
Ying F, Zhao S, Wang J. A Security Information Transmission Method Based on DHR for Seafloor Observation Network. Sensors. 2024; 24(4):1147. https://doi.org/10.3390/s24041147
Chicago/Turabian StyleYing, Fei, Shengjie Zhao, and Jia Wang. 2024. "A Security Information Transmission Method Based on DHR for Seafloor Observation Network" Sensors 24, no. 4: 1147. https://doi.org/10.3390/s24041147
APA StyleYing, F., Zhao, S., & Wang, J. (2024). A Security Information Transmission Method Based on DHR for Seafloor Observation Network. Sensors, 24(4), 1147. https://doi.org/10.3390/s24041147