A TRIVIAL PROTECTED PLAN FOR DETECT ATTRIBUTION FAKE AND CONTAINER PLUNGE ATTACKS IN WIRELESS SENSOR NETWORKS

Mummadi Sarada

Abstract


Data provenance represents an essential consider evaluating the standing of sensor data. Large-scale sensor systems are deployed in many application domains, along with data they collect are employed in decision-creating critical infrastructures. A malicious foe may introduce additional nodes within the network or compromise existing ones. Therefore, assuring high data trustworthiness is important for proper decision-making. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. Provenance management for sensor systems introduces several challenging needs, for example low energy and bandwidth consumption, efficient storage and secure transmission. During this paper, we advise a manuscript lightweight plan to safely transmit provenance for sensor data. The suggested technique depends upon in packet Blossom filters to encode provenance. We introduce efficient mechanisms for provenance verification and renovation inside the base station. Furthermore, we extend the secure provenance plan with functionality to know packet drop attacks staged by malicious data forwarding nodes. We consider the suggested technique both analytically and empirically, along with results prove the success and efficiency within the lightweight secure provenance plan to find packet forgery and loss attacks.


Keywords


Provenance, Security, Sensor Networks

References


K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer, “Provenance-aware storage systems,” in Proc. of the USENIX Annual Technical Conf., 2006, pp. 4–4.

A. Liu and P. Ning, “TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks,” in Proc. of IPSN, 2008, pp. 245–256.

A. Syalim, T. Nishide, and K. Sakurai, “Preserving integrity and confidentiality of a directed acyclic graph model of provenance,” in Proc. of the Working Conf. on Data and Applications Security and Privacy, 2010, pp. 311–318.

P. Levis, N. Lee, M. Welsh, and D. Culler, “TOSSIM: accurate and scalable simulation of entire tinyos applications,” in Proc. of the Intl. Conf. on Embedded networked sensor systems, 2003, pp. 126–137.

L. Fan, P. Cao, J. Almeida, and A. Z. Broder, “Summary cache: a scalable wide-area web cache sharing protocol,” IEEE/ACM Trans. Netw., vol. 8, no. 3, pp. 281–293, Jun. 2000.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.