Skip to main content

Securing Internet of Things in 5G Using Audio Steganography

  • Conference paper
  • First Online:
Smart Trends in Information Technology and Computer Communications (SmartCom 2016)

Abstract

The data usage pattern is changing rapidly in many real life applications and these applications have converged in Smart Phones. 5th generation wireless networks will envision a widespread use of Internet of Things (IoT). With the growing demands for communication between Internet of Things using 5G networks, securing devices will emerge as a big challenge. There will be hidden exchange of data between the devices for which security can be achieved with audio steganography. The aim of the paper is to formulate the model supports the methodology and infrastructure desired to implement the security for IoT in 5G networks. Audio steganography is an invisible communication used for hidden exchange of the data. Internet of things applications varies from ubiquitous computing to machine to machine communications with most applications will be on Voice over IP and will require securing of data from eavesdroppers and attackers. So, the focus of this research paper is on how can we secure internet of things using audio steganography in 5G Platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Pirinen, P.: A brief overview of 5G research activities. In: 1st International Conference on 5G for Ubiquitious Connectivity (5GU), pp. 17–22. IEEE (2014)

    Google Scholar 

  2. Tudzarov, A., Janevski, T.: Functional architecture for 5G mobile networks. Int. J. Adv. Sci. Technol. 32, 65–78 (2011)

    Google Scholar 

  3. Mousa, A.M.: Prospective of fifth generation mobile communications. Int. J. Next Gener. Netw. (IJNGN) 4(3), 1–30 (2012)

    Google Scholar 

  4. Jeffrey, G., Stefano, B., Wan, C., Stephen, H., Angel, L., Anthony, C.K.S., Charlie, Z.: What will 5G be. In: IEEE JSAC Special Isuue on 5G Wireless Communication System (2014)

    Google Scholar 

  5. Singh, S., Singh, P.: Key concepts and network architecture for 5G mobile technology. Int. J. Sci. Res. Eng. Technol. (IJSRET) 1(5), 165–170 (2012)

    Google Scholar 

  6. Chen, Y.P., Yang, Y.H.: A new 4G architecture providing multimode terminals always best connected services. IEEE Wirel. Commun. (2007)

    Google Scholar 

  7. Xichun, L., Gani, A., Omar, Z.: The future of mobile wireless communication networks. In: International Conference on Communication Software and Network (2009)

    Google Scholar 

  8. Farooq, M., Ishtiaq, A.M., Usman, MAl: Future generations of mobile communication networks. Acad. Contemp. Res. J. VII(I), 15–21 (2013). ISSN: 2305-865

    Google Scholar 

  9. Rappaport, T.S.: Wireless Communications Principle and Practice, 2nd edn, Chap. 2. Pearson Education (Singapore) Pte. Ltd

    Google Scholar 

  10. El-Emam. N.N.: Hiding a large amount of data with high security using steganography algorithm. Computer Science (2007)

    Google Scholar 

  11. Morkel, T., Eloff, J.H.P., Oliver, M.S.: An overview of audio steganography. In: Proceedings of the ISSA. Steganography Protection against removal (Document marking) (2005)

    Google Scholar 

  12. Yahya, A., Ahmad, B., Osamah, M.A.: Protection against detection (Information hiding). Qershi International Journal of Computer Science (2005)

    Google Scholar 

  13. Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Computer Journal (1998)

    Google Scholar 

  14. Jamil, T.: Steganography: The art of hiding information in plain sight. IEEE Potentials (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tanya Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Singh, T., Verma, S., Parashar, V. (2016). Securing Internet of Things in 5G Using Audio Steganography. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds) Smart Trends in Information Technology and Computer Communications. SmartCom 2016. Communications in Computer and Information Science, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-10-3433-6_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3433-6_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3432-9

  • Online ISBN: 978-981-10-3433-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics