ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey on Provenance Forgery attack and detection methods in Wireless Sensor Network

Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.5, No. 1)

Publication Date:

Authors : ; ;

Page : 051-053

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Abstract Wireless Sensor Network is widely used in many application domains. These nodes collect data from many sensor nodes. This data is first passes through the intermediate node and then can be aggregated at single node. This collected data is used for decision making. The security, integrity and confidentiality of the transmitted data are the most important part in the WSN transmission. There are many possible attacks like provenance forgery, Packet drop attack, DDos attack, Jamming attack etc. are found in the WSN while transmitting the data. Data provenance keeps log information of data about who accessed this data, who modified this data, the path from the data is traversed etc. Data provenance has important role in the evaluation of trustworthiness of data therefore, it is important to secure data provenance. This paper surveys different approaches existed in literature for securing the data provenance. Keywords: Wireless sensor network, Provenance forgery attack, Bloom Filter, Data Provenance

Last modified: 2016-03-08 16:26:28