A Secure Model for Detecting Origin Forgery and Packet Drop Attacks in Wireless Network
IJSTE-International Journal of Science Technology & Engineering |
Since data are originated and processed by multiple agents in wireless sensor networks, data provenance plays an important role for assuring data trustworthiness. Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or
... in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, a novel lightweight scheme to securely transmit provenance for sensor data is proposed. The proposed technique relies on in-packet Bloom filters to encode provenance. An efficient mechanism for provenance verification and reconstruction at the base station is introduced. In addition, extended the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. Experimental results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.