An Efficient and Secure Method for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
نویسنده
چکیده
A Lightweight Secure Scheme for Detecting In computer networking, a packet drop attack or black hole attack is a type of denial-of-service attack in which a router that is supposed to relay packets instead discards them. This usually occurs from a router becoming compromised from a number of different causes. One cause mentioned in research is through a denial-of-service attack on the router using a known DDoS tool. Because packets are routinely dropped from a lossy network, the packet drop attack is very hard to detect and prevent. In Wireless Sensor Networks. Wireless Sensor Network is broadly used in many application domains. These nodes collect data from many sensor nodes. There are many promising attacks like provenance forgery, Packet drop attack, Jamming attack etc. are found in the WSN while transmitting the data. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decisionmaking. Data provenance keeps log information of data about who accessed this data, who modified this data, the path from the data is traversed etc. Data provenance has important role in the evaluation of trustworthiness of data therefore, it is important to secure data provenance. The packet drop attack can be frequently deployed to attack wireless sensor network. The malicious router can also accomplish this attack selectively. The several challenging requirements for provenance management and packet drop attacks in sensor networks are low energy and low bandwidth consumption, competent storage and secure transmission. In this paper focus on Provenance Forgery attack, Packet Loss and Detection methods in Wireless Sensor Network.
منابع مشابه
Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustw...
متن کاملAccurate Detection of Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
Wireless sensor networks are most increasingly used in several applications such as wild habitat monitoring, forest fire detection and military surveillance area. Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing node...
متن کاملAn Efficient Secure Provenance Scheme For Packet Drop Attacks In Wireless Sensor Networks
This paper presents a scheme to securely transmit provenance for the sensor data. Prove the effectiveness and efficiency of the secure provenance scheme in detecting packet loss attacks. Data are collected from multiple sources through the middle processing nodes. Propose a scheme to securely transmit Provenance for data and introduce a efficient mechanism for provenance verification and recons...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملA Novel Approach to Packet Loss and Detection Techniques in Wireless Sensor Networks
Remote Sensor Network is extensively used as a part of various application ranges. These centers assemble data from various sensor center points. There are various promising attacks like provenance impersonation, Packet drop ambush, DDos strike, Jamming strike thus on are found in the WSN while transmitting the data. A pernicious adversary may show additional center points in the framework or e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017