Safe Diffusion of Provenance in Wireless Sensor Networks Using in-Packet Bloom Filter Provenance Encoding Technique

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Wireless Sensor Networks (WSN) comprises of tiny wireless sensor nodes for continuous observation of physical or environmental               conditions. Sensor networks are increasingly deployed in decision-making infrastructures. They are widely used for battlefield                     monitoring systems and Supervisory Control and Data Acquisition (SCADA) systems. Making decision makers aware of the trust                 worthiness of the collected data is crucial. WSNs are used by Business Applications. These applications depend on trustworthy sensor data to control business processes. It is important to ensure the trustworthiness of the data generated from sensor nodes so that effective decisions can be made. Making decision makers aware of the trustworthiness of the collected data is crucial. WSNs are used by Business Applications. These applications depend on trustworthy sensor data to control business processes.We have proposed a different approach for provenance diffusion for WSN using Bloom filters. The major security attributes of the scheme are freshness, confidentiality and integrity. Experimental characteristics and results evaluating the scheme output the efficiency of the provenance encoding and its transmission.



  • Keywords

    Bloom filter, encoding, provenance, WSN.

  • References

      [1] Hyo-Sang L, Moon YS & Bertino E, “Provenance based trustworthiness assessment in sensor networks”, Proceedings of the seventh international workshop on data management for sensor networks, (2010), pp.2-7.

      [2] Ramachandran A, Bhandankar K, Tariq M & Feamster N, “Packets With Provenance”, Technical Report Gt-Cs-08-02, Georgia Tech, (2008).

      [3] Wang C, Hussain SR & Bertino E, “Dictionary based secure provenance compression for wireless sensor networks”, IEEE Trans Parallel Distributed Systems, Vol.27, No.2,(2016), pp.405– 418.

      [4] Sultana S, Ghinita G, Bertino E & Shehab M, “A Light weight Secure Provenance Scheme for detecting provenance forgery and packet drop attacks in Wireless Sensor Networks”, IEEE Trans Dependable Secure Computing, Vol.12, No.3, (2015), pp.256-269.

      [5] Zhou W, Zhou X, Yang F & Li X, “Contact-based trace back in wireless sensor networks.”, International conference on wireless communications, networking and mobile computing, (2007), pp. 2487-2490.

      [6] Sujesh Lal P & Joeprathap PM, “A novel approach for Provenance Transmission in Wireless Sensor Networks”, Journal of Advanced Research in Dynamical & Control Systems, Vol.10, No.3, (2018), pp.321-326.

      [7] Xue K, Ma C, Hong P & Ding R, “A temporal credential based Mutual Authentication and Key agreement Scheme for Wireless Sensor Networks”, International Journal of Network and Computer Applications, Vol.36, No.1,(2013), pp.316-323.

      [8] Salmin S, Mohamed S & Elisa B, “Secure provenance transmission for streaming data”, IEEE Trans Knowledge Data Eng, Vol.25, No.8, (2013), pp. 1890-1903.

      [9] Jiang Q, Ma J, Lu X & Tian Y, “An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks”, Peer-to-peer Networking and Applications, (2015), pp.1-12.

      [10] Lal SP & Joe Prathap PM, “Security Issues in Wireless Sensor Networks–An Overview”, International Journal of Computer Science and Information Technology, Vol.6, (2015), pp.920-924.

      [11] Althobaiti O, Al-Rodhaan M & Al-Dhelaan A, “An efficient biometric authentication protocol for wireless sensor networks”, International Journal of Distributed Sensor Networks, Vol.9, No.5,(2013).

      [12] Menon VG, Joe Prathap PM & Vijay A, “Eliminating Redundant Relaying of Data Packets for Efficient Opportunistic Routing in Dynamic Wireless Ad Hoc Networks”, Asian Journal of Information Technology, Vol.12, No.17, (2016).

      [13] Das AK, “A Secure and Efficient Biometric-based User Authentication Scheme for Wireless Sensor Networks using Smartcard and fuzzy extractor”, International journal of Communication Systems, (2015).

      [14] Lal SP & Viswakarma HR, “QoS Based Bandwidth Allocation for Networks”, International Journal of Computer Science and Information Technology, Vol.2, No.2, (2009), pp.111-119.

      [15] Choi Y, Lee Y & Won D, “Security improvements on biometric based authentication schemes for WSN using fuzzy extraction”, Int J. Distri. Sensor Netw., Vol.116, (2016).

      [16] Rothenberg C & Macapuna C, “In-packet bloom filters: Design and networking applications”, Computer Networking, Vol.55, No.6, (2011), pp.1364-1378.

      [17] Hussain S, Wang C, Sultana S & Bertino E, “Secure data provenance compression using arithmetic coding in wireless sensor networks”, IEEE International, Performance computing and communications conference (IPCCC), (2014), pp.1-10.

      [18] Alam SI & Fahmy S, “A practical approach for provenance transmission in wireless sensor networks”, AdHoc Networks, (2014), pp.28-45.

      [19] Sultana S, Ghinita G, Bertino E & Shihab M, “A Light weight Secure Provenance Scheme for Wireless Sensor Networks”, IEEE International Conference on Parallel and Distributed Systems, (2012), pp.101-108.

      [20] Wang C, Zhenh W & Bertino E, “Provenance for wireless sensor networks: A Survey”, Open Access–, (2016).

      [21] Z Yesembayeva (2018). Determination of the pedagogical conditions for forming the readiness of future primary school teachers, Opción, Año 33. 475-499

      [22] G Mussabekova, S Chakanova, A Boranbayeva, A Utebayeva, K Kazybaeva, K Alshynbaev (2018). Structural conceptual model of forming readiness for innovative activity of future teachers in general education school. Opción, Año 33. 217-240




Article ID: 17893
DOI: 10.14419/ijet.v7i3.27.17893

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.