Survey on Provenance Forgery attack and detection methods in Wireless Sensor Network
Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.6, No. 1)Publication Date: 2017-03-11
Authors : Ashutosh Bajpei; Geetika Narang;
Page : 51-53
Keywords : Wireless sensor network; Provenance forgery attack; Bloom Filter; Data Provenance;
Abstract
Abstract Wireless Sensor Network is widely used in many application domains. These nodes collect data from many sensor nodes. This data is first passes through the intermediate node and then can be aggregated at single node. This collected data is used for decision making. The security, integrity and confidentiality of the transmitted data are the most important part in the WSN transmission. There are many possible attacks like provenance forgery, Packet drop attack, DDos attack, Jamming attack etc. are found in the WSN while transmitting the data. Data provenance keeps log information of data about who accessed this data, who modified this data, the path from the data is traversed etc. Data provenance has important role in the evaluation of trustworthiness of data therefore, it is important to secure data provenance. This paper surveys different approaches existed in literature for securing the data provenance.
Other Latest Articles
- Survey on Approaches, Problems and applications of the Boosting
- Development of hydraulic calculator for flow calculation through Notches, Weirs and Orifices in Agricultural Water Management
- Efficient and Secure Operations of the New Secure E-Voting Authentication Preparation Scheme (EV-APS)
- Review Paper on Pulse Triggered Flip-Flop based on various Technique
- Survey on Approaches, Problems and Applications of Ensemble of Classifiers
Last modified: 2017-03-11 23:48:36