MALICIOUS ADVERSARY DECISION MAKING FOR COMPLEX INFRASTRUCTURES

Jabilli Sowjanya, P. Pandarinath

Abstract


A malicious foe may introduce additional nodes within the network or compromise existing ones. Therefore, assuring high data trustworthiness is vital for proper decision-making. Data provenance represents a vital element in evaluating the standing of sensor data. Large-scale sensor systems are deployed in several application domains, and also the data they collect are utilized in decision-creating critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. Provenance management for sensor systems introduces several challenging needs, for example low energy and bandwidth consumption, efficient storage and secure transmission. Within this paper, we advise a manuscript lightweight plan to safely transmit provenance for sensor data. The suggested technique depends on in packet Blossom filters to encode provenance. We assess the suggested technique both analytically and empirically, and also the results prove the success and efficiency from the lightweight secure provenance plan in discovering packet forgery and loss attacks. We introduce efficient mechanisms for provenance verification and renovation in the base station. Additionally, we extend the secure provenance plan with functionality to identify packet drop attacks staged by malicious data forwarding nodes.


Keywords


Provenance; Security; Sensor Networks

References


K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer, “Provenance-aware storage systems,” in Proc. of the USENIX Annual Technical Conf., 2006, pp. 4–4.

L. Fan, P. Cao, J. Almeida, and A. Z. Broder, “Summary cache: a scalable wide-area web cache sharing protocol,” IEEE/ACM Trans. Netw., vol. 8, no. 3, pp. 281–293, Jun. 2000.

A. Liu and P. Ning, “TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks,” in Proc. of IPSN, 2008, pp. 245–256.

A. Syalim, T. Nishide, and K. Sakurai, “Preserving integrity and confidentiality of a directed acyclic graph model of provenance,” in Proc. of the Working Conf. on Data and Applications Security and Privacy, 2010, pp. 311–318.

P. Levis, N. Lee, M. Welsh, and D. Culler, “TOSSIM: accurate and scalable simulation of entire tinyos applications,” in Proc. of the Intl. Conf. on Embedded networked sensor systems, 2003, pp. 126–137.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.