A Novel Approach For Secure Scheme Of Detecting Data Provenance And Packet Drop Attacks In Sensor Networks

Syed Gulam Gouse, Dr.R.Kiran Kumar

Abstract


Sensor networks are utilized as a part of various application spaces, for example, digital physical framework frameworks, natural checking, control lattices, and so on. Information are created at an extensive number of sensor hub sources and handled in-organize at middle of the road jumps on their way to a Base Station (BS) that performs basic leadership. The assorted variety of information sources makes the need to guarantee the reliability of information, to such an extent that lone dependable data is considered in the choice procedure. Information provenance is a successful strategy to evaluate information reliability, since it outlines the historical backdrop of proprietorship and the activities performed on the information. Information provenance speaks to a key factor in assessing the reliability of sensor information. Provenance administration for sensor systems presents a few testing necessities, for example, low vitality and transfer speed utilization, effective capacity and secure transmission. In this paper particular commitments are:

References


H. Lim, Y. Moon, and E. Bertino, “Provenance-based trustworthiness assessment in sensor networks,†in Proc. of Data Management for Sensor Networks, 2010, pp. 2–7.

I. Foster, J. Vockler, M. Wilde, and Y. Zhao, “Chimera: A virtual data system for representing, querying, and automating data derivation,†in Proc. of the Conf. on Scientific and Statistical Database Management, 2002, pp. 37–46.

K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer, “Provenance-aware storage systems,†in Proc. of the USENIX AnnualTechnical Conf., 2006, pp. 4–4.

Y. Simmhan, B. Plale, and D. Gannon, “A survey of data provenance in e-science,†SIGMOD Record, vol. 34, pp. 31–36, 2005.

R. Hasan, R. Sion, and M. Winslett, “The case of the fake picasso: Preventing history forgery with secure provenance,†in Proc. Of FAST, 2009, pp. 1–14.

S. Madden, J. Franklin, J. Hellerstin, and W. Hong, “TAG: a tiny aggregation service for ad-hoc sensor networks,†SIGOPS Operating Systems Review, no. SI, Dec. 2002.

K. Dasgupta, K. Kalpakis, and P. Namjoshi, “An efficient clustering based heuristic for data gathering and aggregation in sensor networks,†in Proc. of Wireless Communications and Networking Conference, 2003, pp. 1948–1953.

S. Sultana, E. Bertino, and M. Shehab, “A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks,†in Proc. of ICDCS Workshops, 2011, pp. 332–338.

L. Fan, P. Cao, J. Almeida, and A. Z. Broder, “Summary cache: a scalable wide-area web cache sharing protocol,†IEEE/ACM Trans. Netw., vol. 8, no. 3, pp. 281–293, Jun. 2000.

A. Kirsch and M. Mitzenmacher, “Distnce-sensitive bloom filters,†in Proc. of the Workshop on Algorithm Engineering and Experiments, 2006, pp. 41–50.

C. Rothenberg, C. Macapuna, M. Magalhaes, F. V rdi, and A. Wiesmaier, “In-packet bloom filters: Design and networking applications,†Computer Networks, vol. 55, no. 6, pp. 1364 – 1378, 2011.

M. Garofalakis, J. Hellerstein, and P. Maniatis, “Proof sketches: Verifiable in-netwok aggregation,†in ICDE, 2007, pp. 84–89.

T. Wolf, “Data path credentials for high-performance capabilitiesbased networks.†in Proc. of ACM/IEEE Symp. on Architectures for Networking and Communications Systems., 2008, pp. 129–130.

H. Chan, A. Perrig, and D. Song, “Secure hierarchical in-network aggregation in sensor networks,†in Proc. of the conf. on Computer and communications security (CCS), 2006, pp. 278–287.

S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure data aggregation in wireless sensor networks,†IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1040–1052, 2012.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â