A Secure Scheme for Sensing Background Forgery and Packet Dropattacks in WSN

P. SURESH, . N. SUJATHA

Abstract


The basic operation in such a network is the efficient gathering and transmission of sensed data to a base station for advance processing. The life of such a sensor system is the time during which we can gather information from all the sensors to the base station. A fundamental challenge in data gathering is to maximize the system lifetime, given the energy constraints. As sensor networks are being all the time more deployed in decision-making. The process that on in packet Bloom filters to encode provenance of the information. We introduce efficient tools for provenance verification method and reconstruction method at the base station with the functionality to detection packet drop attacks or by malicious data forwarding nodes. In our paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. We introduce efficient tools for provenance verification and reconstruction at the base station. In addition the secure provenance scheme with the functionality to detection packet drop attacks by malicious data from the source to destination node. we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks


Full Text:

PDF




Copyright (c) 2016 P. SURESH, . N. SUJATHA

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org