Secure Provenance Scheme for Wireless Sensor Networks
نویسندگان
چکیده
Large-scale sensor systems are helpful in various application areas, and the information they gather are utilized as a part of decision making for basic foundations. Information is surged from numerous sources through intermediate nodes that aggregate the data. A malicious opponent may enter with the data by introducing additional nodes in the network. Information provenance is a key component in assessing the reliability of sensor information. Provenance administration for sensor systems presents a few testing prerequisites, for example, low vitality and data transfer capacity utilization, efûcient capacity, and secure transmission. A novel lightweight plan is proposed to transmit safe provenance for sensor information. The proposed system depends on in-packet Bloom ûlters to encode provenance. Efûcient mechanism for provenance veriûcation and reconstructing at the base station is introduced. The proposed technique is evaluated both logically and experimentally, and the outcomes demonstrate the effectiveness and efûciency of the lightweight secure provenance plan in recognizing packet assembling and unwanted attacks.
منابع مشابه
Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملAn Efficient Secure Provenance Scheme For Packet Drop Attacks In Wireless Sensor Networks
This paper presents a scheme to securely transmit provenance for the sensor data. Prove the effectiveness and efficiency of the secure provenance scheme in detecting packet loss attacks. Data are collected from multiple sources through the middle processing nodes. Propose a scheme to securely transmit Provenance for data and introduce a efficient mechanism for provenance verification and recons...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016