A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks

Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing 2015-05, Vol.12 (3), p.256-269
Hauptverfasser: Sultana, Salmin, Ghinita, Gabriel, Bertino, Elisa, Shehab, Mohamed
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 269
container_issue 3
container_start_page 256
container_title IEEE transactions on dependable and secure computing
container_volume 12
creator Sultana, Salmin
Ghinita, Gabriel
Bertino, Elisa
Shehab, Mohamed
description Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.
doi_str_mv 10.1109/TDSC.2013.44
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1683617699</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6624109</ieee_id><sourcerecordid>3697629261</sourcerecordid><originalsourceid>FETCH-LOGICAL-c198t-17930a1d7edf956ea8e1414f0b6da5471bb0979b06398d74599abf7726524fe03</originalsourceid><addsrcrecordid>eNo9kMFLwzAUh4MoOKc3b14CXu3Ma9OkOY7NqTB0sInHkravW7fZzCRz7L83ZeLlvfeDj9-Dj5BbYAMAph4X4_loEDNIBpyfkR4oDhFjkJ2HO-VplCoJl-TKuTVjMc8U7xEzpNNmufIH7CadY7m3SOflCr-Q1sbSMXosfdMu6cyaH2x1WyKdGLtEe6S6rehMlxv0dGzNbuh9CI42Lf1sLG7RudDYulDzhv5g7MZdk4tabx3e_O0--Zg8LUYv0fT9-XU0nEYlqMxHIFXCNFQSq1qlAnWGwIHXrBCVTrmEomBKqoKJRGWV5KlSuqiljEUa8xpZ0if3p96dNd97dD5fm71tw8scRJYIkEKpQD2cqNIa5yzW-c42X9oec2B5pzTvlOad0pzzgN-d8AYR_1EhYh7Q5BeHKHIY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1683617699</pqid></control><display><type>article</type><title>A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Sultana, Salmin ; Ghinita, Gabriel ; Bertino, Elisa ; Shehab, Mohamed</creator><creatorcontrib>Sultana, Salmin ; Ghinita, Gabriel ; Bertino, Elisa ; Shehab, Mohamed</creatorcontrib><description>Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2013.44</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Aggregates ; Base stations ; Data models ; Data transmission ; Decision analysis ; Decision making ; Educational institutions ; Electronic mail ; Encoding ; Forgery ; Network security ; Provenance ; Security ; sensor networks ; Sensors ; Studies ; Wireless networks</subject><ispartof>IEEE transactions on dependable and secure computing, 2015-05, Vol.12 (3), p.256-269</ispartof><rights>Copyright IEEE Computer Society May-Jun 2015</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c198t-17930a1d7edf956ea8e1414f0b6da5471bb0979b06398d74599abf7726524fe03</citedby><cites>FETCH-LOGICAL-c198t-17930a1d7edf956ea8e1414f0b6da5471bb0979b06398d74599abf7726524fe03</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6624109$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27923,27924,54757</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6624109$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sultana, Salmin</creatorcontrib><creatorcontrib>Ghinita, Gabriel</creatorcontrib><creatorcontrib>Bertino, Elisa</creatorcontrib><creatorcontrib>Shehab, Mohamed</creatorcontrib><title>A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.</description><subject>Aggregates</subject><subject>Base stations</subject><subject>Data models</subject><subject>Data transmission</subject><subject>Decision analysis</subject><subject>Decision making</subject><subject>Educational institutions</subject><subject>Electronic mail</subject><subject>Encoding</subject><subject>Forgery</subject><subject>Network security</subject><subject>Provenance</subject><subject>Security</subject><subject>sensor networks</subject><subject>Sensors</subject><subject>Studies</subject><subject>Wireless networks</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMFLwzAUh4MoOKc3b14CXu3Ma9OkOY7NqTB0sInHkravW7fZzCRz7L83ZeLlvfeDj9-Dj5BbYAMAph4X4_loEDNIBpyfkR4oDhFjkJ2HO-VplCoJl-TKuTVjMc8U7xEzpNNmufIH7CadY7m3SOflCr-Q1sbSMXosfdMu6cyaH2x1WyKdGLtEe6S6rehMlxv0dGzNbuh9CI42Lf1sLG7RudDYulDzhv5g7MZdk4tabx3e_O0--Zg8LUYv0fT9-XU0nEYlqMxHIFXCNFQSq1qlAnWGwIHXrBCVTrmEomBKqoKJRGWV5KlSuqiljEUa8xpZ0if3p96dNd97dD5fm71tw8scRJYIkEKpQD2cqNIa5yzW-c42X9oec2B5pzTvlOad0pzzgN-d8AYR_1EhYh7Q5BeHKHIY</recordid><startdate>201505</startdate><enddate>201505</enddate><creator>Sultana, Salmin</creator><creator>Ghinita, Gabriel</creator><creator>Bertino, Elisa</creator><creator>Shehab, Mohamed</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope></search><sort><creationdate>201505</creationdate><title>A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks</title><author>Sultana, Salmin ; Ghinita, Gabriel ; Bertino, Elisa ; Shehab, Mohamed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c198t-17930a1d7edf956ea8e1414f0b6da5471bb0979b06398d74599abf7726524fe03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Aggregates</topic><topic>Base stations</topic><topic>Data models</topic><topic>Data transmission</topic><topic>Decision analysis</topic><topic>Decision making</topic><topic>Educational institutions</topic><topic>Electronic mail</topic><topic>Encoding</topic><topic>Forgery</topic><topic>Network security</topic><topic>Provenance</topic><topic>Security</topic><topic>sensor networks</topic><topic>Sensors</topic><topic>Studies</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Sultana, Salmin</creatorcontrib><creatorcontrib>Ghinita, Gabriel</creatorcontrib><creatorcontrib>Bertino, Elisa</creatorcontrib><creatorcontrib>Shehab, Mohamed</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sultana, Salmin</au><au>Ghinita, Gabriel</au><au>Bertino, Elisa</au><au>Shehab, Mohamed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2015-05</date><risdate>2015</risdate><volume>12</volume><issue>3</issue><spage>256</spage><epage>269</epage><pages>256-269</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2013.44</doi><tpages>14</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1545-5971
ispartof IEEE transactions on dependable and secure computing, 2015-05, Vol.12 (3), p.256-269
issn 1545-5971
1941-0018
language eng
recordid cdi_proquest_journals_1683617699
source IEEE Electronic Library (IEL)
subjects Aggregates
Base stations
Data models
Data transmission
Decision analysis
Decision making
Educational institutions
Electronic mail
Encoding
Forgery
Network security
Provenance
Security
sensor networks
Sensors
Studies
Wireless networks
title A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T10%3A11%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Lightweight%20Secure%20Scheme%20for%20Detecting%20Provenance%20Forgery%20and%20Packet%20DropAttacks%20in%20Wireless%20Sensor%20Networks&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Sultana,%20Salmin&rft.date=2015-05&rft.volume=12&rft.issue=3&rft.spage=256&rft.epage=269&rft.pages=256-269&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2013.44&rft_dat=%3Cproquest_RIE%3E3697629261%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1683617699&rft_id=info:pmid/&rft_ieee_id=6624109&rfr_iscdi=true