Safe Diffusion of Provenance in Wireless Sensor Networks Using in-Packet Bloom Filter Provenance Encoding Technique
Keywords:Bloom filter, encoding, provenance, WSN.
AbstractWireless Sensor Networks (WSN) comprises of tiny wireless sensor nodes for continuous observation of physical or environmental Â Â Â Â Â Â Â Â Â Â Â Â Â Â conditions. Sensor networks are increasingly deployed in decision-making infrastructures. They are widely used for battlefield Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â monitoring systems and Supervisory Control and Data Acquisition (SCADA) systems. Making decision makers aware of the trustÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â worthiness of the collected data is crucial. WSNs are used by Business Applications. These applications depend on trustworthy sensor data to control business processes. It is important to ensure the trustworthiness of the data generated from sensor nodes so that effective decisions can be made. Making decision makers aware of the trustworthiness of the collected data is crucial. WSNs are used by Business Applications. These applications depend on trustworthy sensor data to control business processes.We have proposed a different approach for provenance diffusion for WSN using Bloom filters. The major security attributes of the scheme are freshness, confidentiality and integrity. Experimental characteristics and results evaluating the scheme output the efficiency of the provenance encoding and its transmission.
 Hyo-Sang L, Moon YS & Bertino E, â€œProvenance based trustworthiness assessment in sensor networksâ€, Proceedings of the seventh international workshop on data management for sensor networks, (2010), pp.2-7.
 Ramachandran A, Bhandankar K, Tariq M & Feamster N, â€œPackets With Provenanceâ€, Technical Report Gt-Cs-08-02, Georgia Tech, (2008).
 Wang C, Hussain SR & Bertino E, â€œDictionary based secure provenance compression for wireless sensor networksâ€, IEEE Trans Parallel Distributed Systems, Vol.27, No.2,(2016), pp.405â€“ 418.
 Sultana S, Ghinita G, Bertino E & Shehab M, â€œA Light weight Secure Provenance Scheme for detecting provenance forgery and packet drop attacks in Wireless Sensor Networksâ€, IEEE Trans Dependable Secure Computing, Vol.12, No.3, (2015), pp.256-269.
 Zhou W, Zhou X, Yang F & Li X, â€œContact-based trace back in wireless sensor networks.â€, International conference on wireless communications, networking and mobile computing, (2007), pp. 2487-2490.
 Sujesh Lal P & Joeprathap PM, â€œA novel approach for Provenance Transmission in Wireless Sensor Networksâ€, Journal of Advanced Research in Dynamical & Control Systems, Vol.10, No.3, (2018), pp.321-326.
 Xue K, Ma C, Hong P & Ding R, â€œA temporal credential based Mutual Authentication and Key agreement Scheme for Wireless Sensor Networksâ€, International Journal of Network and Computer Applications, Vol.36, No.1,(2013), pp.316-323.
 Salmin S, Mohamed S & Elisa B, â€œSecure provenance transmission for streaming dataâ€, IEEE Trans Knowledge Data Eng, Vol.25, No.8, (2013), pp. 1890-1903.
 Jiang Q, Ma J, Lu X & Tian Y, â€œAn efficient two-factor user authentication scheme with unlinkability for wireless sensor networksâ€, Peer-to-peer Networking and Applications, (2015), pp.1-12.
 Lal SP & Joe Prathap PM, â€œSecurity Issues in Wireless Sensor Networksâ€“An Overviewâ€, International Journal of Computer Science and Information Technology, Vol.6, (2015), pp.920-924.
 Althobaiti O, Al-Rodhaan M & Al-Dhelaan A, â€œAn efficient biometric authentication protocol for wireless sensor networksâ€, International Journal of Distributed Sensor Networks, Vol.9, No.5,(2013).
 Menon VG, Joe Prathap PM & Vijay A, â€œEliminating Redundant Relaying of Data Packets for Efficient Opportunistic Routing in Dynamic Wireless Ad Hoc Networksâ€, Asian Journal of Information Technology, Vol.12, No.17, (2016).
 Das AK, â€œA Secure and Efficient Biometric-based User Authentication Scheme for Wireless Sensor Networks using Smartcard and fuzzy extractorâ€, International journal of Communication Systems, (2015).
 Lal SP & Viswakarma HR, â€œQoS Based Bandwidth Allocation for Networksâ€, International Journal of Computer Science and Information Technology, Vol.2, No.2, (2009), pp.111-119.
 Choi Y, Lee Y & Won D, â€œSecurity improvements on biometric based authentication schemes for WSN using fuzzy extractionâ€, Int J. Distri. Sensor Netw., Vol.116, (2016).
 Rothenberg C & Macapuna C, â€œIn-packet bloom filters: Design and networking applicationsâ€, Computer Networking, Vol.55, No.6, (2011), pp.1364-1378.
 Hussain S, Wang C, Sultana S & Bertino E, â€œSecure data provenance compression using arithmetic coding in wireless sensor networksâ€, IEEE International, Performance computing and communications conference (IPCCC), (2014), pp.1-10.
 Alam SI & Fahmy S, â€œA practical approach for provenance transmission in wireless sensor networksâ€, AdHoc Networks, (2014), pp.28-45.
 Sultana S, Ghinita G, Bertino E & Shihab M, â€œA Light weight Secure Provenance Scheme for Wireless Sensor Networksâ€, IEEE International Conference on Parallel and Distributed Systems, (2012), pp.101-108.
 Wang C, Zhenh W & Bertino E, â€œProvenance for wireless sensor networks: A Surveyâ€, Open Accessâ€“Springerlink.com, (2016).
 Z Yesembayeva (2018). Determination of the pedagogical conditions for forming the readiness of future primary school teachers, OpciÃ³n, AÃ±o 33. 475-499
 G Mussabekova, S Chakanova, A Boranbayeva, A Utebayeva, K Kazybaeva, K Alshynbaev (2018). Structural conceptual model of forming readiness for innovative activity of future teachers in general education school. OpciÃ³n, AÃ±o 33. 217-240