A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks
Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on dependable and secure computing 2015-05, Vol.12 (3), p.256-269 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 269 |
---|---|
container_issue | 3 |
container_start_page | 256 |
container_title | IEEE transactions on dependable and secure computing |
container_volume | 12 |
creator | Sultana, Salmin Ghinita, Gabriel Bertino, Elisa Shehab, Mohamed |
description | Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks. |
doi_str_mv | 10.1109/TDSC.2013.44 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1683617699</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6624109</ieee_id><sourcerecordid>3697629261</sourcerecordid><originalsourceid>FETCH-LOGICAL-c198t-17930a1d7edf956ea8e1414f0b6da5471bb0979b06398d74599abf7726524fe03</originalsourceid><addsrcrecordid>eNo9kMFLwzAUh4MoOKc3b14CXu3Ma9OkOY7NqTB0sInHkravW7fZzCRz7L83ZeLlvfeDj9-Dj5BbYAMAph4X4_loEDNIBpyfkR4oDhFjkJ2HO-VplCoJl-TKuTVjMc8U7xEzpNNmufIH7CadY7m3SOflCr-Q1sbSMXosfdMu6cyaH2x1WyKdGLtEe6S6rehMlxv0dGzNbuh9CI42Lf1sLG7RudDYulDzhv5g7MZdk4tabx3e_O0--Zg8LUYv0fT9-XU0nEYlqMxHIFXCNFQSq1qlAnWGwIHXrBCVTrmEomBKqoKJRGWV5KlSuqiljEUa8xpZ0if3p96dNd97dD5fm71tw8scRJYIkEKpQD2cqNIa5yzW-c42X9oec2B5pzTvlOad0pzzgN-d8AYR_1EhYh7Q5BeHKHIY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1683617699</pqid></control><display><type>article</type><title>A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Sultana, Salmin ; Ghinita, Gabriel ; Bertino, Elisa ; Shehab, Mohamed</creator><creatorcontrib>Sultana, Salmin ; Ghinita, Gabriel ; Bertino, Elisa ; Shehab, Mohamed</creatorcontrib><description>Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2013.44</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Aggregates ; Base stations ; Data models ; Data transmission ; Decision analysis ; Decision making ; Educational institutions ; Electronic mail ; Encoding ; Forgery ; Network security ; Provenance ; Security ; sensor networks ; Sensors ; Studies ; Wireless networks</subject><ispartof>IEEE transactions on dependable and secure computing, 2015-05, Vol.12 (3), p.256-269</ispartof><rights>Copyright IEEE Computer Society May-Jun 2015</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c198t-17930a1d7edf956ea8e1414f0b6da5471bb0979b06398d74599abf7726524fe03</citedby><cites>FETCH-LOGICAL-c198t-17930a1d7edf956ea8e1414f0b6da5471bb0979b06398d74599abf7726524fe03</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6624109$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27923,27924,54757</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6624109$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sultana, Salmin</creatorcontrib><creatorcontrib>Ghinita, Gabriel</creatorcontrib><creatorcontrib>Bertino, Elisa</creatorcontrib><creatorcontrib>Shehab, Mohamed</creatorcontrib><title>A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.</description><subject>Aggregates</subject><subject>Base stations</subject><subject>Data models</subject><subject>Data transmission</subject><subject>Decision analysis</subject><subject>Decision making</subject><subject>Educational institutions</subject><subject>Electronic mail</subject><subject>Encoding</subject><subject>Forgery</subject><subject>Network security</subject><subject>Provenance</subject><subject>Security</subject><subject>sensor networks</subject><subject>Sensors</subject><subject>Studies</subject><subject>Wireless networks</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMFLwzAUh4MoOKc3b14CXu3Ma9OkOY7NqTB0sInHkravW7fZzCRz7L83ZeLlvfeDj9-Dj5BbYAMAph4X4_loEDNIBpyfkR4oDhFjkJ2HO-VplCoJl-TKuTVjMc8U7xEzpNNmufIH7CadY7m3SOflCr-Q1sbSMXosfdMu6cyaH2x1WyKdGLtEe6S6rehMlxv0dGzNbuh9CI42Lf1sLG7RudDYulDzhv5g7MZdk4tabx3e_O0--Zg8LUYv0fT9-XU0nEYlqMxHIFXCNFQSq1qlAnWGwIHXrBCVTrmEomBKqoKJRGWV5KlSuqiljEUa8xpZ0if3p96dNd97dD5fm71tw8scRJYIkEKpQD2cqNIa5yzW-c42X9oec2B5pzTvlOad0pzzgN-d8AYR_1EhYh7Q5BeHKHIY</recordid><startdate>201505</startdate><enddate>201505</enddate><creator>Sultana, Salmin</creator><creator>Ghinita, Gabriel</creator><creator>Bertino, Elisa</creator><creator>Shehab, Mohamed</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope></search><sort><creationdate>201505</creationdate><title>A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks</title><author>Sultana, Salmin ; Ghinita, Gabriel ; Bertino, Elisa ; Shehab, Mohamed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c198t-17930a1d7edf956ea8e1414f0b6da5471bb0979b06398d74599abf7726524fe03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Aggregates</topic><topic>Base stations</topic><topic>Data models</topic><topic>Data transmission</topic><topic>Decision analysis</topic><topic>Decision making</topic><topic>Educational institutions</topic><topic>Electronic mail</topic><topic>Encoding</topic><topic>Forgery</topic><topic>Network security</topic><topic>Provenance</topic><topic>Security</topic><topic>sensor networks</topic><topic>Sensors</topic><topic>Studies</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Sultana, Salmin</creatorcontrib><creatorcontrib>Ghinita, Gabriel</creatorcontrib><creatorcontrib>Bertino, Elisa</creatorcontrib><creatorcontrib>Shehab, Mohamed</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sultana, Salmin</au><au>Ghinita, Gabriel</au><au>Bertino, Elisa</au><au>Shehab, Mohamed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2015-05</date><risdate>2015</risdate><volume>12</volume><issue>3</issue><spage>256</spage><epage>269</epage><pages>256-269</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2013.44</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1545-5971 |
ispartof | IEEE transactions on dependable and secure computing, 2015-05, Vol.12 (3), p.256-269 |
issn | 1545-5971 1941-0018 |
language | eng |
recordid | cdi_proquest_journals_1683617699 |
source | IEEE Electronic Library (IEL) |
subjects | Aggregates Base stations Data models Data transmission Decision analysis Decision making Educational institutions Electronic mail Encoding Forgery Network security Provenance Security sensor networks Sensors Studies Wireless networks |
title | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T10%3A11%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Lightweight%20Secure%20Scheme%20for%20Detecting%20Provenance%20Forgery%20and%20Packet%20DropAttacks%20in%20Wireless%20Sensor%20Networks&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Sultana,%20Salmin&rft.date=2015-05&rft.volume=12&rft.issue=3&rft.spage=256&rft.epage=269&rft.pages=256-269&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2013.44&rft_dat=%3Cproquest_RIE%3E3697629261%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1683617699&rft_id=info:pmid/&rft_ieee_id=6624109&rfr_iscdi=true |