A Novel Approach For Secure Scheme Of Detecting Data Provenance And Packet Drop Attacks In Sensor Networks
Abstract
References
H. Lim, Y. Moon, and E. Bertino, “Provenance-based trustworthiness assessment in sensor networks,†in Proc. of Data Management for Sensor Networks, 2010, pp. 2–7.
I. Foster, J. Vockler, M. Wilde, and Y. Zhao, “Chimera: A virtual data system for representing, querying, and automating data derivation,†in Proc. of the Conf. on Scientific and Statistical Database Management, 2002, pp. 37–46.
K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer, “Provenance-aware storage systems,†in Proc. of the USENIX AnnualTechnical Conf., 2006, pp. 4–4.
Y. Simmhan, B. Plale, and D. Gannon, “A survey of data provenance in e-science,†SIGMOD Record, vol. 34, pp. 31–36, 2005.
R. Hasan, R. Sion, and M. Winslett, “The case of the fake picasso: Preventing history forgery with secure provenance,†in Proc. Of FAST, 2009, pp. 1–14.
S. Madden, J. Franklin, J. Hellerstin, and W. Hong, “TAG: a tiny aggregation service for ad-hoc sensor networks,†SIGOPS Operating Systems Review, no. SI, Dec. 2002.
K. Dasgupta, K. Kalpakis, and P. Namjoshi, “An efficient clustering based heuristic for data gathering and aggregation in sensor networks,†in Proc. of Wireless Communications and Networking Conference, 2003, pp. 1948–1953.
S. Sultana, E. Bertino, and M. Shehab, “A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks,†in Proc. of ICDCS Workshops, 2011, pp. 332–338.
L. Fan, P. Cao, J. Almeida, and A. Z. Broder, “Summary cache: a scalable wide-area web cache sharing protocol,†IEEE/ACM Trans. Netw., vol. 8, no. 3, pp. 281–293, Jun. 2000.
A. Kirsch and M. Mitzenmacher, “Distnce-sensitive bloom filters,†in Proc. of the Workshop on Algorithm Engineering and Experiments, 2006, pp. 41–50.
C. Rothenberg, C. Macapuna, M. Magalhaes, F. V rdi, and A. Wiesmaier, “In-packet bloom filters: Design and networking applications,†Computer Networks, vol. 55, no. 6, pp. 1364 – 1378, 2011.
M. Garofalakis, J. Hellerstein, and P. Maniatis, “Proof sketches: Verifiable in-netwok aggregation,†in ICDE, 2007, pp. 84–89.
T. Wolf, “Data path credentials for high-performance capabilitiesbased networks.†in Proc. of ACM/IEEE Symp. on Architectures for Networking and Communications Systems., 2008, pp. 129–130.
H. Chan, A. Perrig, and D. Song, “Secure hierarchical in-network aggregation in sensor networks,†in Proc. of the conf. on Computer and communications security (CCS), 2006, pp. 278–287.
S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure data aggregation in wireless sensor networks,†IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1040–1052, 2012.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â