Devices in the Internet of Things (IoT) produce large amounts of sensitive data. However, the use of the public Internet for data transfer by IoT devices makes them susceptible to… Click to show full abstract
Devices in the Internet of Things (IoT) produce large amounts of sensitive data. However, the use of the public Internet for data transfer by IoT devices makes them susceptible to cyber attacks. Among these attacks, data tampering or modification attacks to disrupt or bias the states of applications using these data may result in widespread damage and outages. To detect such attacks, this paper proposes an efficient and simple technique to detect data tampering in IoT systems. The proposed mechanism uses a random time hopping sequence and random permutations to hide validation information. We also present a formal security analysis of the proposed protocol. Performance analysis of the proposed protocol shows that it has low computational complexity and is suitable for IoT systems.
               
Click one of the above tabs to view related content.