SlideShare a Scribd company logo
A Lightweight Secure Scheme for Detecting Provenance
Forgery and Packet Drop Attacks in Wireless Sensor
Networks
ABSTRACT:
Large-scale sensor networks are deployed in numerous application domains, and
the data they collect are used in decision making for critical infrastructures. Data
are streamed from multiple sources through intermediate processing nodes that
aggregate information. A malicious adversary may introduce additional nodes in
the network or compromise existing ones. Therefore, assuring high data
trustworthiness is crucial for correct decision-making. Data provenance represents
a key factor in evaluating the trustworthiness of sensor data. Provenance
management for sensor networks introduces several challenging requirements,
such as low energy and bandwidth consumption, efficient storage and secure
transmission. In this paper, we propose a novel lightweight scheme to securely
transmit provenance for sensor data. The proposed technique relies on in-packet
Bloom filters to encode provenance. We introduce efficient mechanisms for
provenance verification and reconstruction at the base station. In addition, we
extend the secure provenance scheme with functionality to detect packet drop
attacks staged by malicious data forwarding nodes. We evaluate the proposed
technique both analytically and empirically, and the results prove the effectiveness
and efficiency of the lightweight secure provenance scheme in detecting packet
forgery and loss attacks.
EXISTING SYSTEM:
 Recent research highlighted the key contribution of provenance in systems
where the use of untrustworthy data may lead to catastrophic failures (e.g.,
SCADA systems). Although provenance modeling, collection, and querying
have been studied extensively for workflows and curated databases,
provenance in sensornetworks has not been properly addressed.
DISADVANTAGES OF EXISTING SYSTEM:
 Traditional provenance security solutions use intensively cryptography and
digital signatures, and they employ append-based data structures to store
provenance, leading to prohibitive costs.
 Existing research employs separate transmission channels for data and
provenance.
PROPOSED SYSTEM:
 We investigate the problem of secure and efficient provenance transmission
and processing for sensor networks, and we use provenance to detect packet
loss attacks staged by malicious sensor nodes.
 Our goal is to design a provenance encoding and decoding mechanism that
satisfies such security and performance needs. We propose a provenance
encoding strategy whereby each node on the path of a data packet securely
embeds provenance information within a Bloom filter (BF) that is
transmitted along with the data. Upon receiving the packet, the BS extracts
and verifies the provenance information. We also devise an extension of the
provenance encoding scheme that allows the BS to detect if a packet drop
attack was staged by a malicious node.
ADVANTAGES OF PROPOSED SYSTEM:
 We use only fast message authentication code (MAC) schemes and Bloom
filters, which are fixed-size data structures that compactly represent
provenance. Bloom filters make efficient usage of bandwidth, and they yield
low error rates in practice.
 We formulate the problem of secure provenance transmission in sensor
networks, and identify the challenges specific to this context.
 We proposean in-packet Bloom filter (iBF) provenance-encoding scheme.
 We design efficient techniques for provenance decoding and verification at
the base station.
 We extend the secure provenance encoding scheme and devise a mechanism
that detects packet drop attacks staged by malicious forwarding sensor
nodes.
 We perform a detailed security analysis and performance evaluation of the
proposed provenance encoding scheme and packet loss detection
mechanism.
 We only require a single channel for both transmission channels for data and
provenance.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
Sink
Cluster Head
Data Gathering
Transmission to
Sink
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7/LINUX.
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool Command
Language)
 Tool : Cygwin (To simulate in Windows OS)
REFERENCE:
Salmin Sultana, Gabriel Ghinita, Member, IEEE , Elisa Bertino, Fellow, IEEE ,
and Mohamed Shehab, Member, IEEE Computer Society, “A Lightweight Secure
Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless
Sensor Networks”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE
COMPUTING, VOL. 12, NO. 3, MAY/JUNE 2015.

More Related Content

PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
DOC
Lightweight secure scheme for detecting provenance forgery and packet drop at...
PDF
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
PDF
2.espk external agent authentication and session key establishment using publ...
PDF
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
PPT
Detection and localization of multiple spoofing attacks in
PDF
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
2.espk external agent authentication and session key establishment using publ...
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
Detection and localization of multiple spoofing attacks in
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...

What's hot (20)

PDF
Ieee 2015 2016
PDF
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
PDF
Source location privacy in wireless sensor networks using data mules.
PDF
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
PDF
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
PDF
Enhancing the Techniques to Secure Grid Computing
DOCX
Toward a statistical framework for source anonymity in sensor networks
PDF
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
DOCX
Toward a statistical framework for source anonymity in sensor networks
DOCX
efficient authentication for mobile and pervasive computing
PDF
A novel signature based traffic classification engine to reduce false alarms ...
DOCX
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
PDF
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
PDF
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
PDF
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
PDF
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
PDF
Enhanced security for non English users of Wireless Sensor Networks
PDF
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
PDF
COMP8045 - Project Report v.1.3
PDF
Analyze and Detect Packet Loss for Data Transmission in WSN
Ieee 2015 2016
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Source location privacy in wireless sensor networks using data mules.
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
Enhancing the Techniques to Secure Grid Computing
Toward a statistical framework for source anonymity in sensor networks
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
Toward a statistical framework for source anonymity in sensor networks
efficient authentication for mobile and pervasive computing
A novel signature based traffic classification engine to reduce false alarms ...
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
COMP8045 - Project Report v.1.3
Analyze and Detect Packet Loss for Data Transmission in WSN
Ad

Viewers also liked (20)

PPTX
Project presentation
PDF
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
PDF
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
DOCX
Secure auditing and deduplicating data in cloud
DOCX
Secure auditing and deduplicating data in cloud
PDF
Mobile cloud computing
PPTX
Visible Light Communication
PPTX
Palm vein technology
PPT
Mobile cloud computing; Future of Cloud Computing
PPTX
VISIBLE LIGHT COMMUNICATION
PPT
palm vein technology and its applications
PDF
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
PPTX
Palm vein technology.pptx
PPTX
Palm Vein Technology
PPTX
Mobile Cloud Computing
PDF
visible light communication
PPTX
Mobile Cloud Computing Challenges and Security
PPT
PPTX
Palm-Vein Technology
Project presentation
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
Mobile cloud computing
Visible Light Communication
Palm vein technology
Mobile cloud computing; Future of Cloud Computing
VISIBLE LIGHT COMMUNICATION
palm vein technology and its applications
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
Palm vein technology.pptx
Palm Vein Technology
Mobile Cloud Computing
visible light communication
Mobile Cloud Computing Challenges and Security
Palm-Vein Technology
Ad

Similar to A lightweight secure scheme for detecting (20)

DOCX
A lightweight secure scheme for detecting provenance forgery and packet drop ...
PPTX
Lspnew (1)
PDF
A Survey of provenance management in wireless sensor network
PDF
A Survey of provenance management in wireless sensor network
PDF
Dictionary based-secure-provenance Comparissoion for wireless sensor nertwork
PPTX
DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK
PDF
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
PPTX
becan
PPTX
Security Method in Data Acquisition Wireless Sensor Network
PDF
ijaerv13n9_59.pdf
DOCX
Hop by hop message authentication chapter 1
PDF
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
PDF
AN EVALUATION OF ENERGY EFFICIENT SOURCE AUTHENTICATION METHODS FOR FALSE DA...
DOCX
Secure Distibuted data discovery & dissemination IN WSN
PDF
A Study on Security in Wireless Sensor Networks
PDF
IEEE Projects 2012-2013 Network Security
DOC
Java and .net IEEE 2012
PDF
A TRUST-BASED MULTIPATH CONGESTION-AWARE ROUTING TECHNIQUE TO CURB WORMHOLE A...
DOC
Privacy and integrity-preserving range queries in sensor networks
DOC
Privacy and integrity-preserving range queries in sensor networks
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Lspnew (1)
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
Dictionary based-secure-provenance Comparissoion for wireless sensor nertwork
DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
becan
Security Method in Data Acquisition Wireless Sensor Network
ijaerv13n9_59.pdf
Hop by hop message authentication chapter 1
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
AN EVALUATION OF ENERGY EFFICIENT SOURCE AUTHENTICATION METHODS FOR FALSE DA...
Secure Distibuted data discovery & dissemination IN WSN
A Study on Security in Wireless Sensor Networks
IEEE Projects 2012-2013 Network Security
Java and .net IEEE 2012
A TRUST-BASED MULTIPATH CONGESTION-AWARE ROUTING TECHNIQUE TO CURB WORMHOLE A...
Privacy and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks

More from jpstudcorner (20)

DOCX
Variable length signature for near-duplicate
DOCX
Robust representation and recognition of facial
DOCX
Revealing the trace of high quality jpeg
DOCX
Revealing the trace of high quality jpeg
DOCX
Pareto depth for multiple-query image retrieval
DOCX
Multifocus image fusion based on nsct
DOCX
Image super resolution based on
DOCX
Fractal analysis for reduced reference
DOCX
Face sketch synthesis via sparse representation based greedy search
DOCX
Face recognition across non uniform motion
DOCX
Combining left and right palmprint images for
DOCX
A probabilistic approach for color correction
DOCX
A no reference texture regularity metric
DOCX
A feature enriched completely blind image
DOCX
Sel csp a framework to facilitate
DOCX
Query aware determinization of uncertain
DOCX
Psmpa patient self controllable
DOCX
Privacy preserving and truthful detection
DOCX
Privacy policy inference of user uploaded
DOCX
Page a partition aware engine
Variable length signature for near-duplicate
Robust representation and recognition of facial
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
Pareto depth for multiple-query image retrieval
Multifocus image fusion based on nsct
Image super resolution based on
Fractal analysis for reduced reference
Face sketch synthesis via sparse representation based greedy search
Face recognition across non uniform motion
Combining left and right palmprint images for
A probabilistic approach for color correction
A no reference texture regularity metric
A feature enriched completely blind image
Sel csp a framework to facilitate
Query aware determinization of uncertain
Psmpa patient self controllable
Privacy preserving and truthful detection
Privacy policy inference of user uploaded
Page a partition aware engine

Recently uploaded (20)

PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT
Project quality management in manufacturing
PDF
PPT on Performance Review to get promotions
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Welding lecture in detail for understanding
PPTX
Geodesy 1.pptx...............................................
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Construction Project Organization Group 2.pptx
PDF
composite construction of structures.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Sustainable Sites - Green Building Construction
PPTX
web development for engineering and engineering
PPTX
UNIT 4 Total Quality Management .pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Project quality management in manufacturing
PPT on Performance Review to get promotions
Internet of Things (IOT) - A guide to understanding
Welding lecture in detail for understanding
Geodesy 1.pptx...............................................
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Construction Project Organization Group 2.pptx
composite construction of structures.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
bas. eng. economics group 4 presentation 1.pptx
R24 SURVEYING LAB MANUAL for civil enggi
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Lecture Notes Electrical Wiring System Components
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Sustainable Sites - Green Building Construction
web development for engineering and engineering
UNIT 4 Total Quality Management .pptx

A lightweight secure scheme for detecting

  • 1. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks ABSTRACT: Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed
  • 2. technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks. EXISTING SYSTEM:  Recent research highlighted the key contribution of provenance in systems where the use of untrustworthy data may lead to catastrophic failures (e.g., SCADA systems). Although provenance modeling, collection, and querying have been studied extensively for workflows and curated databases, provenance in sensornetworks has not been properly addressed. DISADVANTAGES OF EXISTING SYSTEM:  Traditional provenance security solutions use intensively cryptography and digital signatures, and they employ append-based data structures to store provenance, leading to prohibitive costs.  Existing research employs separate transmission channels for data and provenance.
  • 3. PROPOSED SYSTEM:  We investigate the problem of secure and efficient provenance transmission and processing for sensor networks, and we use provenance to detect packet loss attacks staged by malicious sensor nodes.  Our goal is to design a provenance encoding and decoding mechanism that satisfies such security and performance needs. We propose a provenance encoding strategy whereby each node on the path of a data packet securely embeds provenance information within a Bloom filter (BF) that is transmitted along with the data. Upon receiving the packet, the BS extracts and verifies the provenance information. We also devise an extension of the provenance encoding scheme that allows the BS to detect if a packet drop attack was staged by a malicious node. ADVANTAGES OF PROPOSED SYSTEM:  We use only fast message authentication code (MAC) schemes and Bloom filters, which are fixed-size data structures that compactly represent provenance. Bloom filters make efficient usage of bandwidth, and they yield low error rates in practice.
  • 4.  We formulate the problem of secure provenance transmission in sensor networks, and identify the challenges specific to this context.  We proposean in-packet Bloom filter (iBF) provenance-encoding scheme.  We design efficient techniques for provenance decoding and verification at the base station.  We extend the secure provenance encoding scheme and devise a mechanism that detects packet drop attacks staged by malicious forwarding sensor nodes.  We perform a detailed security analysis and performance evaluation of the proposed provenance encoding scheme and packet loss detection mechanism.  We only require a single channel for both transmission channels for data and provenance.
  • 5. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz. Sink Cluster Head Data Gathering Transmission to Sink
  • 6.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS) REFERENCE: Salmin Sultana, Gabriel Ghinita, Member, IEEE , Elisa Bertino, Fellow, IEEE , and Mohamed Shehab, Member, IEEE Computer Society, “A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 12, NO. 3, MAY/JUNE 2015.