Compressed sensing has been proposed to both yield low-cost compression and low-cost encryption. This can be very useful in the design of sensor nodes with a limited resource budget whose acquisition must be kept as private as possible. We here analyze the susceptibility of compressed sensing stages that are optimized to maximize compression performance by rakeness-based design to ciphertext-only and known-plaintext attacks. A tradeoff between compression and security is highlighted. Notwithstanding such a tradeoff, rakeness-based compressed sensing exhibits a noteworthy robustness to classical attacks.
Mangia, M., Pareschi, F., Rovatti, R., Setti, G. (2018). Low-Cost Security of IoT Sensor Nodes with Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 13(2), 327-340 [10.1109/TIFS.2017.2749982].
Low-Cost Security of IoT Sensor Nodes with Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks
Mangia, Mauro;Pareschi, Fabio;Rovatti, Riccardo;Setti, Gianluca
2018
Abstract
Compressed sensing has been proposed to both yield low-cost compression and low-cost encryption. This can be very useful in the design of sensor nodes with a limited resource budget whose acquisition must be kept as private as possible. We here analyze the susceptibility of compressed sensing stages that are optimized to maximize compression performance by rakeness-based design to ciphertext-only and known-plaintext attacks. A tradeoff between compression and security is highlighted. Notwithstanding such a tradeoff, rakeness-based compressed sensing exhibits a noteworthy robustness to classical attacks.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.