A Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks

Prof Sumeet, Mr Khush, Mr Darshan, Mr Sondkar Bhushan, Asst Professor, U Student
2017 International Journal for Research in Engineering Application & Management (IJREAM)   unpublished
Large-scale sensors are deployed in application domains, and the data which is collected are used to make specific decisions for critical infrastructures. Data is collected from different sources through intermediate processing nodes that aggregate information. A malicious adversary may add new nodes in the network which compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Provenance management for device networks introduces many
more » ... roduces many difficult necessities, like low energy and information measure consumption, economical storage and secure transmission. This paper proposes a unique lightweight theme to firmly transmit origin for device knowledge. The papered technique depends on in packet Bloom filters to cypher origin. This paper introduces economical mechanisms for origin verification and reconstruction at the bottom station. Additionally, it extends the secure origin theme with practicality to sight packet drop attacks staged by malicious knowledge forwarding nodes. This paper measure the papered technique each analytically and through empirical observation, and therefore the results prove the effectiveness and potency of the lightweight secure origin theme in sleuthing packet forgery and loss attacks.
fatcat:mzblzzb5hjdmpistrzhzwyn3ou