Loading

Security Text Massage Verification via Steganography and Color Image in Internet of Things Environment
Haider Sh Hashim

Haider Sh Hashim, Department of Computer Sciences, Basra University/ Collage of Education & Pure Sciences/ Basra, Iraq.
Manuscript received on 15 February 2016 | Revised Manuscript received on 25 February 2016 | Manuscript Published on 28 February 2016 | PP: 83-89 | Volume-5 Issue-3, February 2016 | Retrieval Number: C4423025316/16©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of Things (IoT) technologies allow everyday objects including small devices in sensor networks to be capable of connecting to the Internet. Such an innovative technology can lead to positive changes in human life. However, if there is no proper security mechanism, private and sensitive data around humans can be revealed to the public Internet. In this aspect, this paper examines security issues of the IoT that major challenge is faced by IoT. In particular, we focus on the main challenge in exchanging information among devices in IoT’s environment. We have combined the concept of attribute based on steganography and crypto hash function to process data with efficient exchange information between two or more entities in the IoT’s environment. The proposed scheme has several important security features such as key agreement, resisting malicious attacks, and a good performance. The experimental results view the efficiency and sturdiness of our proposed scheme.
Keywords: (IoT), IoT’s, However, Performance, Experimental, Security, Resisting

Scope of the Article: IoT