Open Access   Article Go Back

Sspp: Secure Scheme for Provenance Forgery and Packet Drop Detection in Wireless Sensor Network

Ujwala N1 , Siddaramappa V2

Section:Review Paper, Product Type: Conference Paper
Volume-04 , Issue-03 , Page no. 138-142, May-2016

Online published on Jun 07, 2016

Copyright © Ujwala N, Siddaramappa V . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ujwala N, Siddaramappa V, “Sspp: Secure Scheme for Provenance Forgery and Packet Drop Detection in Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.138-142, 2016.

MLA Style Citation: Ujwala N, Siddaramappa V "Sspp: Secure Scheme for Provenance Forgery and Packet Drop Detection in Wireless Sensor Network." International Journal of Computer Sciences and Engineering 04.03 (2016): 138-142.

APA Style Citation: Ujwala N, Siddaramappa V, (2016). Sspp: Secure Scheme for Provenance Forgery and Packet Drop Detection in Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 04(03), 138-142.

BibTex Style Citation:
@article{N_2016,
author = {Ujwala N, Siddaramappa V},
title = {Sspp: Secure Scheme for Provenance Forgery and Packet Drop Detection in Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {04},
Issue = {03},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {138-142},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=80},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=80
TI - Sspp: Secure Scheme for Provenance Forgery and Packet Drop Detection in Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - Ujwala N, Siddaramappa V
PY - 2016
DA - 2016/06/07
PB - IJCSE, Indore, INDIA
SP - 138-142
IS - 03
VL - 04
SN - 2347-2693
ER -

           

Abstract

Deployment of sensor networks are used in many applications data that are collected by these sensors are used in decision making such as in Supervisory control and data Acquisition, Battlefield monitoring systems and in many other applications. Data are collected from multiple sources through intermediate nodes. Malicious adversary may introduce additional nodes in the network or compromise existing ones. So trustworthiness of the data collected from different sources is important for decision making. In evaluating the trustworthiness of the sensor data provenance plays a key factor. Several challenges that affect the provenance management include secure transmission and efficient storage, bandwidth consumption and low energy. A novel lightweight schema was proposed to transmit provenance of the sensor data securely. Bloom filters are used in the proposed technique to encode provenance. Efficient mechanisms are introduced for reconstruction of the base station and provenance verification. The secure provenance scheme was extended with the functionality to detect packet drop attacks done by malicious data forwarding nodes. We evaluate the proposed technique and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.

Key-Words / Index Term

Trustworthiness, Bloom filters, wireless sensor network.

References

[1] H. Lim, Y. Moon and E. Bertino, “Provenance based trustworthiness assessment in sensor network” proc seventh int’l workshop, pp. 2-7, 2010.
[2] I. Foster, J. Vockler, “Chimera: A virtual data system for representing, querying and automating data derivation” proc. conf. scientistical database management, pp. 37-46, 2002.
[3] K. Muniswamy-Reddy, D. Holland, “Provenance-A ware storage systems” proc. USENIX Ann. Technical conf., pp. 4-4, 2006.
[4] Y. Simmhan, B. Plale, “A survey of data provenance in E-Science” ACM SIGMOD record, vol. 34, pp. 31-36, 2005.
[5] Rohit Aggarwal and Khushboo Bansal , "An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (64-68), Apr -2016