Sspp: Secure Scheme for Provenance Forgery and Packet Drop Detection in Wireless Sensor Network

Authors

  • Ujwala N Department of CSE, City Engineering College, India
  • Siddaramappa V Department of CSE, City Engineering College, India

Keywords:

Trustworthiness, Bloom filters, wireless sensor network

Abstract

Deployment of sensor networks are used in many applications data that are collected by these sensors are used in decision making such as in Supervisory control and data Acquisition, Battlefield monitoring systems and in many other applications. Data are collected from multiple sources through intermediate nodes. Malicious adversary may introduce additional nodes in the network or compromise existing ones. So trustworthiness of the data collected from different sources is important for decision making. In evaluating the trustworthiness of the sensor data provenance plays a key factor. Several challenges that affect the provenance management include secure transmission and efficient storage, bandwidth consumption and low energy. A novel lightweight schema was proposed to transmit provenance of the sensor data securely. Bloom filters are used in the proposed technique to encode provenance. Efficient mechanisms are introduced for reconstruction of the base station and provenance verification. The secure provenance scheme was extended with the functionality to detect packet drop attacks done by malicious data forwarding nodes. We evaluate the proposed technique and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.

References

H. Lim, Y. Moon and E. Bertino, “Provenance based trustworthiness assessment in sensor network” proc seventh int’l workshop, pp. 2-7, 2010.

I. Foster, J. Vockler, “Chimera: A virtual data system for representing, querying and automating data derivation” proc. conf. scientistical database management, pp. 37-46, 2002.

K. Muniswamy-Reddy, D. Holland, “Provenance-A ware storage systems” proc. USENIX Ann. Technical conf., pp. 4-4, 2006.

Y. Simmhan, B. Plale, “A survey of data provenance in E-Science” ACM SIGMOD record, vol. 34, pp. 31-36, 2005.

Rohit Aggarwal and Khushboo Bansal , "An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (64-68), Apr -2016

Downloads

Published

2025-11-11

How to Cite

[1]
N. Ujwala and V. Siddaramappa, “Sspp: Secure Scheme for Provenance Forgery and Packet Drop Detection in Wireless Sensor Network”, Int. J. Comp. Sci. Eng., vol. 4, no. 3, pp. 138–142, Nov. 2025.