Open Access   Article Go Back

Provenance Based Mechanism to identify Packet Drop attack in WSN

Anudeepa 1 , Amutha S2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1488-1492, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.14881492

Online published on Jun 30, 2018

Copyright © Anudeepa, Amutha S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anudeepa, Amutha S, “Provenance Based Mechanism to identify Packet Drop attack in WSN,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1488-1492, 2018.

MLA Style Citation: Anudeepa, Amutha S "Provenance Based Mechanism to identify Packet Drop attack in WSN." International Journal of Computer Sciences and Engineering 6.6 (2018): 1488-1492.

APA Style Citation: Anudeepa, Amutha S, (2018). Provenance Based Mechanism to identify Packet Drop attack in WSN. International Journal of Computer Sciences and Engineering, 6(6), 1488-1492.

BibTex Style Citation:
@article{S_2018,
author = {Anudeepa, Amutha S},
title = {Provenance Based Mechanism to identify Packet Drop attack in WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1488-1492},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2372},
doi = {https://doi.org/10.26438/ijcse/v6i6.14881492}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.14881492}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2372
TI - Provenance Based Mechanism to identify Packet Drop attack in WSN
T2 - International Journal of Computer Sciences and Engineering
AU - Anudeepa, Amutha S
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1488-1492
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
441 304 downloads 282 downloads
  
  
           

Abstract

Wireless sensor networks (WSN) is a wireless connection of the sensor nodes and they spontaneously build the networks so that the sensor data can be communicate wirelessly. Data collected from sensor network are used in decision making. A malicious adversary can introduce additional nodes in the network easily and tamper the information. Provenance is used for assessing the trustworthiness of the data, diagnosing network failures, detecting early signs of attacks, etc. But management of the provenance for sensor networks may lead to several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. We propose an efficient mechanism to securely transmit the data through the nodes using AODV Routing algorithm and secure provenance scheme to detect packet drop attacks in the network using Bloom Filter.

Key-Words / Index Term

Provenance, Ad-hoc On Demand Distance Vector(AODV)

References

[1] Y. Simmhan, B. Plale, and D. Gannon, “A Survey of Data Provenance in E-Science,” ACMSIGMODRecord, vol. 34, pp. 31-36, 2005.
[2] R. Hasan, R. Sion, and M. Winslett, “The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance,” Proc. Seventh Conf. File and Storage Technologies (FAST), pp. 1-14, 2009.
[3] C. Rothenberg, C.Macapuna,M.Magalhaes, F. Verdi, and A. Wiesmaier,“In-Packet Bloom Filters: Design and Networking Applications,” Computer Networks, vol. 55, no. 6, pp. 1364-1378, 2011.
[4] H. Lim, Y. Moon, and E. Bertino, “Provenance-Based Trustworthiness Assessment in Sensor Networks,” Proc. Seventh Int’l WorkshopData Management for Sensor Networks, pp. 2-7, 2010.
[5] Salmin Sultana, Gabriel Ghinita, Member, IEEE ,Elisa Bertino, Fellow, IEEE , and Mohamed Shehab,Member, IEEE Computer Society, “A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks”, ieee transactions on dependable and secure computing, vol. 12, no. 3,may/june 2015.
[6] Salmin Sultana, "A Provenance based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor," in 31st International Conference on Distributed Computing Systems Workshops, 2011.
[7] A. Kirsch and M. Mitzenmacher, “Distance-Sensitive Bloom Filters,” Proc. Workshop Algorithm Eng. and Experiments, pp. 41-50, 2006.
[8] S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure Data Aggregation in Wireless Sensor Networks,” IEEE Trans. Information Forensics and Security, vol. 7, no. 3, pp. 1040-1052, June 2012.
[9] W. Zhou, Q. Fei, A. Narayan, A. Haeberlen, B. Loo, and M. Sherr, Secure Network Provenance, Proc. ACMSOSP, pp. 295-310, 2011.
[10] S. Chong, C. Skalka, and J.A. Vaughan, Self-Identifying Sensor Data, Proc. Ninth ACM/IEEE Intl Conf. Information Processing in Sensor Networks (IPSN), pp. 82-93, 2010.
[11] S. Sultana, M. Shehab, and E. Bertino, Secure Provenance Transmission for Streaming Data, IEEE Trans. Knowledge and Data Eng., vol. 25, no. 8, pp. 1890-1903, Aug. 2013.
[12] R. Laufer, P. Velloso, D. Cunha, I. Moraes, M. Bicudo, M. Moreira, and O.Duarte, Towards Stateless Single-Packet IP Traceback, Proc.32nd IEEE Conf. LocalComputer Networks (LCN), pp. 548-555,2007.