Sspp: Secure Scheme for Provenance Forgery and Packet Drop Detection in Wireless Sensor Network
Keywords:
Trustworthiness, Bloom filters, wireless sensor networkAbstract
Deployment of sensor networks are used in many applications data that are collected by these sensors are used in decision making such as in Supervisory control and data Acquisition, Battlefield monitoring systems and in many other applications. Data are collected from multiple sources through intermediate nodes. Malicious adversary may introduce additional nodes in the network or compromise existing ones. So trustworthiness of the data collected from different sources is important for decision making. In evaluating the trustworthiness of the sensor data provenance plays a key factor. Several challenges that affect the provenance management include secure transmission and efficient storage, bandwidth consumption and low energy. A novel lightweight schema was proposed to transmit provenance of the sensor data securely. Bloom filters are used in the proposed technique to encode provenance. Efficient mechanisms are introduced for reconstruction of the base station and provenance verification. The secure provenance scheme was extended with the functionality to detect packet drop attacks done by malicious data forwarding nodes. We evaluate the proposed technique and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.
References
H. Lim, Y. Moon and E. Bertino, “Provenance based trustworthiness assessment in sensor network” proc seventh int’l workshop, pp. 2-7, 2010.
I. Foster, J. Vockler, “Chimera: A virtual data system for representing, querying and automating data derivation” proc. conf. scientistical database management, pp. 37-46, 2002.
K. Muniswamy-Reddy, D. Holland, “Provenance-A ware storage systems” proc. USENIX Ann. Technical conf., pp. 4-4, 2006.
Y. Simmhan, B. Plale, “A survey of data provenance in E-Science” ACM SIGMOD record, vol. 34, pp. 31-36, 2005.
Rohit Aggarwal and Khushboo Bansal , "An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (64-68), Apr -2016
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
