• DocumentCode
    43485
  • Title

    A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks

  • Author

    Sultana, Salmin ; Ghinita, Gabriel ; Bertino, Elisa ; Shehab, Mohamed

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Purdue Univ., Purdue, IN, USA
  • Volume
    12
  • Issue
    3
  • fYear
    2015
  • fDate
    May-June 2015
  • Firstpage
    256
  • Lastpage
    269
  • Abstract
    Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.
  • Keywords
    data structures; decision making; telecommunication security; wireless sensor networks; bandwidth consumption; base station; critical infrastructures; data collection; data provenance; decision-making; high data trustworthiness; in-packet Bloom filters; intermediate processing nodes; large-scale sensor networks; lightweight secure provenance scheme; loss attacks; low energy consumption; malicious data forwarding nodes; packet drop attack detection; provenance forgery detection; provenance management; provenance reconstruction; provenance verification; sensor data; wireless sensor networks; Aggregates; Base stations; Data models; Educational institutions; Electronic mail; Encoding; Security; Provenance; security; sensor networks;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2013.44
  • Filename
    6624109