Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

A Simple Authentication Protocol for Secure Data Collection in Wireless Sensor Network

Author : Triveni Mane 1 Raveendra.G 2

Date of Publication :7th May 2016

Abstract: For numerous applications large scale sensor network are used and data have been collected are used in process of making decision. Information that are from different origins over intervening nodes that collects information packets. A intervening malicious nodes may introduced by the attacker in the network and or disturbs present nodes. Therefore for making correct decision it is very difficult to providing high data trustworthiness. To find the trustworthiness of sensor data a key factor is represented by data provenance. In sensor network provenance management introduces various challenges like limited bandwidth and energy consumption, efficiency storage and secure transference. This paper prefers a light weight mechanism for securely sending of provenance for sensor input information. To encode provenance the suggested scheme depends on in-packet bloom filter. Here we used this efficient mechanism for verification of provenance and reconstruction of data at base station.

Reference :

  1. [1]Salmin sultan, Elisa Bertino, Mohamed Shehab “A Lightweight Secure Scheme For Detecting Provenance Forgery And Packet Drop Attack In Wireless Sensor Networks” vol.12, No.3, may/june 2105.

    [2]H.Lim,Y.Moon, Elisa Bertino, “Provenance Based Trustworthiness Assessment In Sensor Networks”, seventh international workshop data management for sensor network,pp.2-7,2010.

    [3]K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer, “Provenance Aware Storage System” Proc. USENIX Ann. Technical conf,pp.4-4,2006. 

    [4]Y. Simmhan, B. Plale, D. Gannon, “A survey of data provenance in E-Science,” ACM SIGMOD Record, vol. 34,pp.31-36, 2005.

    [5]S. Sultana, and M. Shehab, “A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks,” Proc. Int’l Conf. Distributed Computing Systems (ICDCS) Workshops, pp. 332-338, 2011.

    [6] A. Kirsch and M. Mitzenmacher, “Distance-Sensitive Bloom Filters,” Proc. Workshop Algorithm Eng. and Experiments, pp. 41-50, 2006.

    [7] C. Rothenberg, C. Macapuna, M. Magalhaes, F. Verdi, and A. Wiesmaier , “In-Packet Bloom Filters: Design and Networking Applications,” Computer Networks, vol. 55, no. 6, pp. 1364-1378, 2011.

    [8] S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure Data Aggregation in Wireless Sensor Networks,” IEEE Trans. Information Forensics and Security, vol. 7, no. 3, pp. 1040- 1052, June 2012


Recent Article