Secure Information Flow for IoT Applications

Tri Minh Ngo, Nhat Vien Duy Nguyen

Abstract


This paper discusses how to ensure security, i.e., confidentiality and integrity properties, for data in IoT applications. While confidentiality could be assessed via information flow analysis, integrity is ensured by error-correcting codes. In addition to errors, many communication channels also cause erasures, i.e., the demodulator cannot decide which symbol the received waveform represents. The paper proposes a method that might correct both errors and erasures together. Our method is efficient in reducing memory storage as well as decoding complexity.

Keywords


Confidentiality; Integrity; Information Flow; Erasure; Separating Matrix; Covering Design.

References


K. A. S. Abdel-Ghaffar and J. H. Weber, “Separating erasures from errors for decoding”, Proceedings of the IEEE International Symposium on Information Theory, Toronto, Canada, pp. 215-219, July 6-11, 2008.

J. H. Weber, Lecture Notes: Error-Correcting Codes, Delft University of Technology, 2007.

J. H. Dinitz, D.R. Stinson, Contemporary Design Theory, A Collection of Surveys, A Wiley-Inter-Science Publication, 1992.

C. Di, D. Proietti, I.E. Telatar, T. J. Richardson, and R. L. Urbanke, “Finite-length analysis of low-density parity-check codes on the binary erasure channel”, IEEE Trans. Inform. Theory, vol. 48, no. 6, pp. 1570-1579, June 2002.

T. M. Ngo, M. Huisman, “Complexity and information flow analysis for multi-threaded programs”, Eur. Phys. J. Spec. Top. 226 (10), 2375–2392 (2017)

H. D. L. Hollmann and L. M. G. M. Tolhuizen, “On parity check collections for iterative erasure decoding that correct all correctable erasure patterns of a given size,” IEEE Trans. Inform. Theory, vol. 53, no. 2, pp. 823-828, February 2007.

La Jolla Covering Repository, http://www.ccrwest.org/cover.html.

R. M. Roth, Introduction to Coding Theory. Cambridge, UK: Cambridge University Press, 2006.

M. Schwartz and A. Vardy, “On the stopping distance and the stopping redundancy of codes,” IEEE Trans. Inform. Theory, vol. 52, no. 3, pp. 922-932, March 2006.

J. H. Weber and K. A. S. Abdel-Ghaffar, “Results on parity-check matrices with optimal stopping and/or dead-end set enumerators,” IEEE Trans. Inform. Theory, vol. 54, no. 3, pp. 1368-1374, March 2008.

S. Lin and D. J. Costello, Jr., Error Control Coding, Pearson Education International, 2004.

F. J. Mac Williams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North-Holland Publishing Company, 1977.

S. A. Vanstone and P. C. van Oorschot, An Introduction to Error-Correcting Codes with Applications, Norwell, MA: Kluwer, 1989.

J. A. Goguen, J. Meseguer, “Security policies and security models”. IEEE Symposium on Security and Privacy, pp. 11–20 (1982).




DOI: http://dx.doi.org/10.30630/joiv.3.2.231

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


JOIV : International Journal on Informatics Visualization
Published by Information Technology Department
Politeknik Negeri Padang, Indonesia

© JOIV - ISSN : 2549-9610 | e-ISSN : 2549-9904 

Phone : +62-82386434344
Email  : hidraamnur@live.com | hidra@pnp.ac.id


Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats