Loading...
Please wait, while we are loading the content...
Similar Documents
Designing of Secure Privacy Preserving Algorithm for Detecting Packet Loss and Provenance Verification in Wireless Ad-Hoc Networks
| Content Provider | Semantic Scholar |
|---|---|
| Author | Kumar, K. Anil Sumithra, R. |
| Copyright Year | 2016 |
| Abstract | Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks. |
| File Format | PDF HTM / HTML |
| DOI | 10.21275/v5i5.nov163548 |
| Alternate Webpage(s) | https://www.ijsr.net/archive/v5i5/NOV163548.pdf |
| Alternate Webpage(s) | https://doi.org/10.21275/v5i5.nov163548 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |