Safe Diffusion of Provenance in Wireless Sensor Networks Using in-Packet Bloom Filter Provenance Encoding Technique


  • Sujesh P Lal
  • P M. Joe Prathap





Bloom filter, encoding, provenance, WSN.


Wireless Sensor Networks (WSN) comprises of tiny wireless sensor nodes for continuous observation of physical or environmental               conditions. Sensor networks are increasingly deployed in decision-making infrastructures. They are widely used for battlefield                     monitoring systems and Supervisory Control and Data Acquisition (SCADA) systems. Making decision makers aware of the trust                 worthiness of the collected data is crucial. WSNs are used by Business Applications. These applications depend on trustworthy sensor data to control business processes. It is important to ensure the trustworthiness of the data generated from sensor nodes so that effective decisions can be made. Making decision makers aware of the trustworthiness of the collected data is crucial. WSNs are used by Business Applications. These applications depend on trustworthy sensor data to control business processes.We have proposed a different approach for provenance diffusion for WSN using Bloom filters. The major security attributes of the scheme are freshness, confidentiality and integrity. Experimental characteristics and results evaluating the scheme output the efficiency of the provenance encoding and its transmission.




[1] Hyo-Sang L, Moon YS & Bertino E, “Provenance based trustworthiness assessment in sensor networksâ€, Proceedings of the seventh international workshop on data management for sensor networks, (2010), pp.2-7.

[2] Ramachandran A, Bhandankar K, Tariq M & Feamster N, “Packets With Provenanceâ€, Technical Report Gt-Cs-08-02, Georgia Tech, (2008).

[3] Wang C, Hussain SR & Bertino E, “Dictionary based secure provenance compression for wireless sensor networksâ€, IEEE Trans Parallel Distributed Systems, Vol.27, No.2,(2016), pp.405– 418.

[4] Sultana S, Ghinita G, Bertino E & Shehab M, “A Light weight Secure Provenance Scheme for detecting provenance forgery and packet drop attacks in Wireless Sensor Networksâ€, IEEE Trans Dependable Secure Computing, Vol.12, No.3, (2015), pp.256-269.

[5] Zhou W, Zhou X, Yang F & Li X, “Contact-based trace back in wireless sensor networks.â€, International conference on wireless communications, networking and mobile computing, (2007), pp. 2487-2490.

[6] Sujesh Lal P & Joeprathap PM, “A novel approach for Provenance Transmission in Wireless Sensor Networksâ€, Journal of Advanced Research in Dynamical & Control Systems, Vol.10, No.3, (2018), pp.321-326.

[7] Xue K, Ma C, Hong P & Ding R, “A temporal credential based Mutual Authentication and Key agreement Scheme for Wireless Sensor Networksâ€, International Journal of Network and Computer Applications, Vol.36, No.1,(2013), pp.316-323.

[8] Salmin S, Mohamed S & Elisa B, “Secure provenance transmission for streaming dataâ€, IEEE Trans Knowledge Data Eng, Vol.25, No.8, (2013), pp. 1890-1903.

[9] Jiang Q, Ma J, Lu X & Tian Y, “An efficient two-factor user authentication scheme with unlinkability for wireless sensor networksâ€, Peer-to-peer Networking and Applications, (2015), pp.1-12.

[10] Lal SP & Joe Prathap PM, “Security Issues in Wireless Sensor Networks–An Overviewâ€, International Journal of Computer Science and Information Technology, Vol.6, (2015), pp.920-924.

[11] Althobaiti O, Al-Rodhaan M & Al-Dhelaan A, “An efficient biometric authentication protocol for wireless sensor networksâ€, International Journal of Distributed Sensor Networks, Vol.9, No.5,(2013).

[12] Menon VG, Joe Prathap PM & Vijay A, “Eliminating Redundant Relaying of Data Packets for Efficient Opportunistic Routing in Dynamic Wireless Ad Hoc Networksâ€, Asian Journal of Information Technology, Vol.12, No.17, (2016).

[13] Das AK, “A Secure and Efficient Biometric-based User Authentication Scheme for Wireless Sensor Networks using Smartcard and fuzzy extractorâ€, International journal of Communication Systems, (2015).

[14] Lal SP & Viswakarma HR, “QoS Based Bandwidth Allocation for Networksâ€, International Journal of Computer Science and Information Technology, Vol.2, No.2, (2009), pp.111-119.

[15] Choi Y, Lee Y & Won D, “Security improvements on biometric based authentication schemes for WSN using fuzzy extractionâ€, Int J. Distri. Sensor Netw., Vol.116, (2016).

[16] Rothenberg C & Macapuna C, “In-packet bloom filters: Design and networking applicationsâ€, Computer Networking, Vol.55, No.6, (2011), pp.1364-1378.

[17] Hussain S, Wang C, Sultana S & Bertino E, “Secure data provenance compression using arithmetic coding in wireless sensor networksâ€, IEEE International, Performance computing and communications conference (IPCCC), (2014), pp.1-10.

[18] Alam SI & Fahmy S, “A practical approach for provenance transmission in wireless sensor networksâ€, AdHoc Networks, (2014), pp.28-45.

[19] Sultana S, Ghinita G, Bertino E & Shihab M, “A Light weight Secure Provenance Scheme for Wireless Sensor Networksâ€, IEEE International Conference on Parallel and Distributed Systems, (2012), pp.101-108.

[20] Wang C, Zhenh W & Bertino E, “Provenance for wireless sensor networks: A Surveyâ€, Open Access–, (2016).

[21] Z Yesembayeva (2018). Determination of the pedagogical conditions for forming the readiness of future primary school teachers, Opción, Año 33. 475-499

[22] G Mussabekova, S Chakanova, A Boranbayeva, A Utebayeva, K Kazybaeva, K Alshynbaev (2018). Structural conceptual model of forming readiness for innovative activity of future teachers in general education school. Opción, Año 33. 217-240

View Full Article: