ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An insight on Provenance based detection of Packet Drop Attack and Data Forgery

Journal: International Journal of Engineering and Techniques (Vol.4, No. 3)

Publication Date:

Authors : ;

Page : 315-319

Keywords : ---;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The wireless sensor network (WSN) generates the data and forward it to intermediate nodes ,which finally forwards the data to the base stations(BS). The sensor nodes are prone introduction of malicious nodes by potential adversaries and it is necessary to address confidentiality, integrity and originality of data provenance. Data provenance allows the BS to trace the source and the forwarding path of an individual data packet. This work presents a brief survey on node level data provenance (which encodes history of data at each node) and the different techniques in WSN like in-packet-bloom filter, arithmetic coding and dictionary based provenance that make use of a light weight provenance scheme for detecting data forgery and packet drop attack.

Last modified: 2018-07-07 16:21:50