Abstract
The data usage pattern is changing rapidly in many real life applications and these applications have converged in Smart Phones. 5th generation wireless networks will envision a widespread use of Internet of Things (IoT). With the growing demands for communication between Internet of Things using 5G networks, securing devices will emerge as a big challenge. There will be hidden exchange of data between the devices for which security can be achieved with audio steganography. The aim of the paper is to formulate the model supports the methodology and infrastructure desired to implement the security for IoT in 5G networks. Audio steganography is an invisible communication used for hidden exchange of the data. Internet of things applications varies from ubiquitous computing to machine to machine communications with most applications will be on Voice over IP and will require securing of data from eavesdroppers and attackers. So, the focus of this research paper is on how can we secure internet of things using audio steganography in 5G Platform.
References
Pirinen, P.: A brief overview of 5G research activities. In: 1st International Conference on 5G for Ubiquitious Connectivity (5GU), pp. 17–22. IEEE (2014)
Tudzarov, A., Janevski, T.: Functional architecture for 5G mobile networks. Int. J. Adv. Sci. Technol. 32, 65–78 (2011)
Mousa, A.M.: Prospective of fifth generation mobile communications. Int. J. Next Gener. Netw. (IJNGN) 4(3), 1–30 (2012)
Jeffrey, G., Stefano, B., Wan, C., Stephen, H., Angel, L., Anthony, C.K.S., Charlie, Z.: What will 5G be. In: IEEE JSAC Special Isuue on 5G Wireless Communication System (2014)
Singh, S., Singh, P.: Key concepts and network architecture for 5G mobile technology. Int. J. Sci. Res. Eng. Technol. (IJSRET) 1(5), 165–170 (2012)
Chen, Y.P., Yang, Y.H.: A new 4G architecture providing multimode terminals always best connected services. IEEE Wirel. Commun. (2007)
Xichun, L., Gani, A., Omar, Z.: The future of mobile wireless communication networks. In: International Conference on Communication Software and Network (2009)
Farooq, M., Ishtiaq, A.M., Usman, MAl: Future generations of mobile communication networks. Acad. Contemp. Res. J. VII(I), 15–21 (2013). ISSN: 2305-865
Rappaport, T.S.: Wireless Communications Principle and Practice, 2nd edn, Chap. 2. Pearson Education (Singapore) Pte. Ltd
El-Emam. N.N.: Hiding a large amount of data with high security using steganography algorithm. Computer Science (2007)
Morkel, T., Eloff, J.H.P., Oliver, M.S.: An overview of audio steganography. In: Proceedings of the ISSA. Steganography Protection against removal (Document marking) (2005)
Yahya, A., Ahmad, B., Osamah, M.A.: Protection against detection (Information hiding). Qershi International Journal of Computer Science (2005)
Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Computer Journal (1998)
Jamil, T.: Steganography: The art of hiding information in plain sight. IEEE Potentials (1999)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, T., Verma, S., Parashar, V. (2016). Securing Internet of Things in 5G Using Audio Steganography. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds) Smart Trends in Information Technology and Computer Communications. SmartCom 2016. Communications in Computer and Information Science, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-10-3433-6_44
Download citation
DOI: https://doi.org/10.1007/978-981-10-3433-6_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3432-9
Online ISBN: 978-981-10-3433-6
eBook Packages: Computer ScienceComputer Science (R0)