Abstract:
The Internet of Things (IoT) system gathers data through diverse smart devices and sensors to make thorough decisions tailored to specific needs. Yet, in intricate IoT se...Show MoreMetadata
Abstract:
The Internet of Things (IoT) system gathers data through diverse smart devices and sensors to make thorough decisions tailored to specific needs. Yet, in intricate IoT setups, privacy infringement occurs through various means like data collection, initial data handling, and data sharing. Therefore, the concealment of data during transmission should receive sufficient attention. The communication approach that merges blockchain technology with covert communication has shown progress in addressing the aforementioned issues. However, this integration has also led to challenges, such as low-data embedding rates and distinctive features in blockchain transactions containing covert data. To seek a solution with high-embedding rates that do not make generated transactions stand out distinctly, this article analyzes the Ethereum transaction field formats, identifies the input data field with high concealment and large capacity as the embedding target, then proposes a data covert transmission scheme based on hybrid embedding in contract fields. This scheme utilizes LSB steganography to embed high-capacity covert data in images, and embeds the URL of the image into the input data field of the Ethereum smart contract transaction, thereby increasing the embedding rates. Subsequently, to further enhance the concealment of this scheme, a data embedding method based on contract relationships is proposed. Through this technique, for the first time, covert data transmission is achieved solely through the invocation relationships of smart contracts within the blockchain covert communication environment, instead of directly embedding covert data into transactions. This method results in transactions that are theoretically indistinguishable from regular transactions, greatly enhancing the security of the scheme. Finally, an evaluation of undetectability, embedding rate, and scalability was conducted for the proposed schemes, concluding that the schemes presented in this article have si...
Published in: IEEE Internet of Things Journal ( Volume: 12, Issue: 5, 01 March 2025)