secure provenance scheme for wireless sensor networks

G.S.P.Krishna,A.Meena Priyadarsini

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 20 December,2016         Pages:1178-1181

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Large-scale sensor systems are helpful in various application areas, and the information they gather are utilized as a part of decision making for basic foundations. Information is surged from numerous sources through halfway preparing hubs that total data. A malicious opponent might present extra hubs in the system or trade off existing ones. In this manner, guaranteeing high information dependability is critical for right choice making. Information provenance speaks to a key component in assessing the reliability of sensor information. Provenance administration for sensor systems presents a few testing prerequisites, for example, low vitality and data transfer capacity utilization, efficient capacity, and secure transmission. In this paper, we propose a novel lightweight plan to transmit safely provenance for sensor information. The proposed system depends on inbundle Bloom filters to encode provenance. We present efficient components for provenance verification and remaking at the base station. Moreover, we develop the provenance safely and plan with usefulness to identify bundle drop assaults arranged by damaging information sending hubs. We assess the proposed strategy both logically and experimentally, and the outcomes demonstrate the activity and efficiency of the lightweight, secure provenance plan in recognizing bundle assembling and unwanted attacks.

Kewords

Provenance, Bloom Filter, Security

Reference

[1]. W. Zhou, Q. Fei, A. Narayan, A. Haeberlen, B. Loo, and M. Sherr, “Secure network provenance,” in Proc. of ACM SOSP, 2011, pp. 295–310. [2]. Y. Simmhan, B. Plale, and D. Gannon, “A survey of data Provenance in e-science,” SIGMOD Record, vol. 34, pp. 31– 36, 2005. [3]. S. Sultana, E. Bertino, and M. Shehab, “A Provenance based mechanism to identify malicious packet dropping adversaries in sensor networks,” in Proc. of ICDCS Workshops, 2011, [4]. S. Sultana, M. Shehab, and E. Bertino, “Secure Provenance transmission for streaming data,” IEEE TKDE, 2012. [5]. S. Sultana, M. Shehab, and E. Bertino, “Secure Provenance transmission for streaming data,” IEEE TKDE, 2012