SCHEMATIC IMPLEMENTATION OF HIGH DATA TRUSTWORTHINESS IN DECISIONS IN UNWIRED BEAM NETS

Tanniru Anusha, Dr R China Appala Naidu

Abstract


In the current occasions, recent has highlighted the key contribution of attribution within systems where use of hard to rely on data could potentially cause disastrous failures. Attribution will be tracked for each packet, however essential challenges will arise due to fixed storage, energy in addition to bandwidth limits of sensor nodes consequently, it is important to create a light-weight attribution solution by way of low overhead. It's important to cope with security needs for example privacy, reliability in addition to originality of attribution and our goal would be to devise an attribution encoding in addition to deciphering way in which assures protection in addition to performance needs. Within our work we recommend a brand new lightweight approach to strongly convey attribution for sensor data. The suggested method is determined by in-packet Blossom filters to repair attribution. Blossom filters make well-organized use of bandwidth, in addition to yield small error rates used.

Keywords


Attribution; Lightweight Method; Encoding; Sensor Nodes; Bandwidth; Bloom Filters; Security

References


M. Garofalakis, J. Hellerstein, and P. Maniatis, “Proof Sketches: Verifiable In-Netwok Aggregation,” Proc. IEEE 23rd Int’l Conf. Data Eng. (ICDE), pp. 84-89, 2007.

F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical en-Route Filtering of Injected False Data in Sensor Networks,” Proc. IEEE INFOCOM, pp. 839-850, 2004.

H. Lim, Y. Moon, and E. Bertino, “Provenance-Based Trustworthiness Assessment in Sensor Networks,” Proc. Seventh Int’l Workshop Data Management for Sensor Networks, pp. 2-7, 2010.

A. Syalim, T. Nishide, and K. Sakurai, “Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance,” Proc. Working Conf. Data and Applications Security and Privacy, pp. 311-318, 2010.

S. Sultana, M. Shehab, and E. Bertino, “Secure Provenance Transmission for Streaming Data,” IEEE Trans. Knowledge and Data Eng. vol. 25, no. 8, pp. 1890-1903, Aug. 2013.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.