Security protection method based on mimic defense and Paillier encryption for smart IoT terminals

Smart internet of things (IoT), with its high flexibility, adaptability, and continuous evolution, brings both new challenges and enhanced user experiences. In particular, the endogenous security and secure transmission issues faced by IoT edge-area smart terminals, due to uncertain threats like unk...

Full description

Saved in:
Bibliographic Details
Main Authors: GU Tiansheng, ZENG Fukang, SHAO Sisi, NIE Yijun, JI Zongkai, ZHENG Yulu, SHI Yuchen, LIU Shangdong, JI Yimu
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2024-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024088
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1823864927162466304
author GU Tiansheng
ZENG Fukang
SHAO Sisi
NIE Yijun
JI Zongkai
ZHENG Yulu
SHI Yuchen
LIU Shangdong
JI Yimu
author_facet GU Tiansheng
ZENG Fukang
SHAO Sisi
NIE Yijun
JI Zongkai
ZHENG Yulu
SHI Yuchen
LIU Shangdong
JI Yimu
author_sort GU Tiansheng
collection DOAJ
description Smart internet of things (IoT), with its high flexibility, adaptability, and continuous evolution, brings both new challenges and enhanced user experiences. In particular, the endogenous security and secure transmission issues faced by IoT edge-area smart terminals, due to uncertain threats like unknown vulnerabilities and backdoors, are of considerable concern in the realm of smart IoT. To address these challenges, a security protection method based on mimic defense and Paillier encryption for smart IoT terminals was proposed. First, a security architecture was constructed based on the mimic defense theory to ensure the reliability and robustness of the system even when the edge domain smart terminal had its own security genetic defects. Then, a secure blind signature with Paillier encryption (SBSPE) algorithm was designed in this architecture to safeguard the data and privacy of the edge-area smart terminals throughout the data processing lifecycle of edge-area smart terminals. Blind signature technology was integrated into SBSPE algorithm on the basis of Paillier semi-homomorphic encryption algorithm. During data encryption, it employed blind factor technology to execute a blind signature, rendering ciphertext information indecipherable even if an attacker obtained access to the decryption key of the Paillier encryption algorithm. It also effectively supported the efficient and reliable transmission of data of the intelligent IoT devices. Finally, taking the mimic smart IoT system as an application scenario, the proposed method was theoretically analyzed and experimentally validated for its improved performance and security.
format Article
id doaj-art-c3276dc743c748c3abb25fa0c73e1d7a
institution Kabale University
issn 2096-109X
language English
publishDate 2024-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-c3276dc743c748c3abb25fa0c73e1d7a2025-02-08T19:00:11ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2024-12-011016417680361837Security protection method based on mimic defense and Paillier encryption for smart IoT terminalsGU TianshengZENG FukangSHAO SisiNIE YijunJI ZongkaiZHENG YuluSHI YuchenLIU ShangdongJI YimuSmart internet of things (IoT), with its high flexibility, adaptability, and continuous evolution, brings both new challenges and enhanced user experiences. In particular, the endogenous security and secure transmission issues faced by IoT edge-area smart terminals, due to uncertain threats like unknown vulnerabilities and backdoors, are of considerable concern in the realm of smart IoT. To address these challenges, a security protection method based on mimic defense and Paillier encryption for smart IoT terminals was proposed. First, a security architecture was constructed based on the mimic defense theory to ensure the reliability and robustness of the system even when the edge domain smart terminal had its own security genetic defects. Then, a secure blind signature with Paillier encryption (SBSPE) algorithm was designed in this architecture to safeguard the data and privacy of the edge-area smart terminals throughout the data processing lifecycle of edge-area smart terminals. Blind signature technology was integrated into SBSPE algorithm on the basis of Paillier semi-homomorphic encryption algorithm. During data encryption, it employed blind factor technology to execute a blind signature, rendering ciphertext information indecipherable even if an attacker obtained access to the decryption key of the Paillier encryption algorithm. It also effectively supported the efficient and reliable transmission of data of the intelligent IoT devices. Finally, taking the mimic smart IoT system as an application scenario, the proposed method was theoretically analyzed and experimentally validated for its improved performance and security.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024088smart IoTedge-area smart terminalsmimic defenseDHR architecturePaillier encryption algorithm
spellingShingle GU Tiansheng
ZENG Fukang
SHAO Sisi
NIE Yijun
JI Zongkai
ZHENG Yulu
SHI Yuchen
LIU Shangdong
JI Yimu
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
网络与信息安全学报
smart IoT
edge-area smart terminals
mimic defense
DHR architecture
Paillier encryption algorithm
title Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
title_full Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
title_fullStr Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
title_full_unstemmed Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
title_short Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
title_sort security protection method based on mimic defense and paillier encryption for smart iot terminals
topic smart IoT
edge-area smart terminals
mimic defense
DHR architecture
Paillier encryption algorithm
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024088
work_keys_str_mv AT gutiansheng securityprotectionmethodbasedonmimicdefenseandpaillierencryptionforsmartiotterminals
AT zengfukang securityprotectionmethodbasedonmimicdefenseandpaillierencryptionforsmartiotterminals
AT shaosisi securityprotectionmethodbasedonmimicdefenseandpaillierencryptionforsmartiotterminals
AT nieyijun securityprotectionmethodbasedonmimicdefenseandpaillierencryptionforsmartiotterminals
AT jizongkai securityprotectionmethodbasedonmimicdefenseandpaillierencryptionforsmartiotterminals
AT zhengyulu securityprotectionmethodbasedonmimicdefenseandpaillierencryptionforsmartiotterminals
AT shiyuchen securityprotectionmethodbasedonmimicdefenseandpaillierencryptionforsmartiotterminals
AT liushangdong securityprotectionmethodbasedonmimicdefenseandpaillierencryptionforsmartiotterminals
AT jiyimu securityprotectionmethodbasedonmimicdefenseandpaillierencryptionforsmartiotterminals