IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1622204                                                     

Assured Scheme for Investigating Provenance Falsification & Packet loss Attacks in Wireless Sensor Networks


Shylaja B N, Devaraja S
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Numerous application domains deploy large scale sensor networks and the data they sense are used in critical infrastructure for decision making. The data packet travel from source node along intermediate nodes to destination where aggregation is done for the original message. So while the data packets are travelling through the specified network there may be chances of malicious adversary introducing additional fake nodes to the existing network to track the information or it may compromise the network to get information. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. The challenging requirements of provenance management for sensor networks are low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, a novel assured scheme is proposed to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. Introducing the efficient mechanisms for provenance verification at each node will guarantee us in preserving the provenance falsification by investigation. Another feature concentrated here is packet drop attacks staged by malicious data forwarding nodes. Evaluation of the results prove effectiveness and efficiency of assured scheme for investigating provenance falsification & packet loss attacks in wireless sensor networks.

Shylaja B N, Devaraja S

Sensor network, Security, Provenance, Bloom Filtering

  1. I. Foster, J. Vockler, M. Wilde, and Y. Zhao, “Chimera: A Virtual Data System for Representing, Querying, and Automating Data Derivation,” Proc. Conf. Scientific and Statistical Database Management, pp. 37-46, 2002.
  2. K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer, “Provenance-Aware Storage systems,” Proc. USENIX Ann. Technical Conf., pp. 4-4, 2006.
  3. C. Rothenberg, C.Macapuna,M.Magalhaes, F. Verdi, and A. Wiesmaier, “In-Packet Bloom Filters: Design and Networking Applications,” Computer Networks, vol. 55, no. 6, pp. 1364-1378, 2011.
  4. R. Hasan, R. Sion, and M. Winslett, “The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance,” Proc. Seventh Conf. File and Storage Technologies (FAST), pp. 1-14, 2009.
  5. S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure Data Aggregation in Wireless Sensor Networks,” IEEE Trans. Information Forensics and Security, vol. 7, no. 3, pp. 1040-1052, June 2012.
  6. Y. Simmhan, B. Plale, and D. Gannon, “A Survey of Data Provenance in E-Science,” ACMSIGMODRecord, vol. 34, pp. 31- 36, 2005.
  7. A. Ramachandran, K. Bhandankar, M. Tariq, and N. Feamster, “Packets with Provenance,” Technical Report GT-CS-08-02, Georgia Tech, 2008.
  8. W. Zhou, M. Sherr, T. Tao, X. Li, B. Loo, and Y. Mao, “Efficient Querying and Maintenance of Network Provenance at Internet- Scale,” Proc. ACM SIGMOD Int’l Conf. Management of Data, pp. 615-626, 2010.
  9. W. Zhou, Q. Fei, A. Narayan, A. Haeberlen, B. Loo, and M. Sherr, “Secure Network Provenance,” Proc. ACMSOSP, pp. 295-310, 2011.
  10. A. Syalim, T. Nishide, and K. Sakurai, “Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance,” Proc. Working Conf. Data and Applications Security and Privacy, pp. 311-318, 2010.
  11. N. Vijayakumar and B. Plale, “Towards Low Overhead Provenance Tracking in Near Real-Time Stream Filtering,” Proc. Int’l Conf. Provenance and Annotation of Data (IPAW), pp. 46-54, 2006.
  12. S. Chong, C. Skalka, and J.A. Vaughan, “Self-Identifying Sensor Data,” Proc. Ninth ACM/IEEE Int’l Conf. Information Processing in Sensor Networks (IPSN), pp. 82-93, 2010. [13] T. Wolf, “Data Path Credentials for High-Performance Capabilities- Based Networks,” Proc. 
  13. ACM/IEEE Symp.Architectures for Networking and Comm. Systems, pp. 129-130, 2008.
  14. R. Laufer, P. Velloso, D. Cunha, I. Moraes, M. Bicudo, M. Moreira, and O.Duarte, “Towards Stateless Single-Packet IP Traceback,” Proc. 32nd IEEE Conf. LocalComputer Networks (LCN), pp. 548- 555, 2007.
  15. P. Jokela, A. Zahemszky, C. Esteve, S. Arianfar, and P. Nikander, “LIPSIN: Line Speed Publish/Subscribe Inter-Networking,” Proc. ACM SIGCOMM Conf. Data Comm., pp. 195-206, 2009.
  16. A. Ghani and P. Nikander, “Secure In-Packet Bloom Filter Forwarding on the Netfpga,” Proc. European NetFPGA Developers Workshop, 2010.

Publication Details

Published in : Volume 2 | Issue 2 | March-April - 2016
Date of Publication Print ISSN Online ISSN
2016-04-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
713-720 IJSRSET1622204   Technoscience Academy

Cite This Article

Shylaja B N, Devaraja S, "Assured Scheme for Investigating Provenance Falsification & Packet loss Attacks in Wireless Sensor Networks", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.713-720, March-April-2016.
URL : http://ijsrset.com/IJSRSET1622204.php




National Conference on Advances in Mechanical Engineering 2017(NCAME 2017)

National Conference on Emerging Trends in Civil Engineering 2017( NCETCE 2017)