M. Tharani, K. Sivachandran, S. N. Saranya, Sasurie Academy of Engineering, Coimbatore, Tamilnadu, India.
DOI : 01.0401/ijaict.2015.07.03
International Journal of Advanced Information and Communication Technology
Received On :January 13, 2019
Revised On : February 12, 2019
Accepted On :March 09, 2019
Published On :April 05, 2019
Volume 06, Issue 04
Pages : 1055-1058
Abstract
The numerous applications should work in Large-scale sensor networks domains. The data collected from wireless sensor network are used in making decisions in critical infrastructures. Data’s are originated from multiple sources and transmitted through intermediate processing nodes. Those nodes perform the aggregation on information. An attacker compromise those type of networks by introducing additional nodes in the network or compromising the existing nodes. So achieving the high data trustworthiness is crucial for correct decision-making. While evaluating the trustworthiness of sensor data provenance is an important factor. The several challenging requirements for provenance management in sensor networks are low energy and low bandwidth consumption, competent storage and secure transmission. This survey proposes a new lightweight scheme in order to securely transmit provenance with sensor data. The proposed in-packet Bloom filters techniques used to encode provenance with the sensor data. This mechanism initially performs provenance at the base station then perform reconstruction of the data at the base station. In addition to this the provenance scheme functionality used to detect packet drop attacks organized by malicious data forwarding nodes. This survey describes the effectiveness and efficiency of the Light weight secure provenance scheme in detecting packet forgery and packet loss attacks.
Keywords
Provenance, security, sensor networks, Packet drop attack, Wireless Sensor Networks, Provenance attack.
Cite this article
M. Tharani, K. Sivachandran, S. N. Saranya, “An Efficient Detection of Forgery and Packet Drop Attacks in Wireless Sensor Networks, ” INTERNATIONAL JOURNAL OF ADVANCED INFORMATION AND COMMUNICATION TECHNOLOGY, pp.1055-1058, April. 2019.
Copyright
© 2019 M. Tharani, K. Sivachandran, S. N. Saranya. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.