An Index-Based Provenance Compression Scheme for Identifying Malicious Nodes in Multihop IoT Network

Data provenance is an effective method to evaluate data reliability and has become a research hotspot in recent years. However, the size of the data provenance will increase rapidly as the number of hops experienced increases, which conflicts with the limitations of energy, storage, and resources of IoT devices. The existing DP provenance compression algorithm has a high error rate when decompressing. To solve this problem, we propose an index-based provenance compression algorithm, which adopts the idea of common substring matching, combined with path identifier and path index to represent the path information in the data provenance, thereby achieving the purpose of reducing the size of data provenance. In addition, we extend the data provenance scheme to attack detection and propose a malicious node identification method based on data provenance. The simulation results show that the proposed scheme has a high compression ratio and higher decoding accuracy and has high accuracy in malicious node identification.

[1]  Marianne Winslett,et al.  The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance , 2009, FAST.

[2]  Nei Kato,et al.  A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues , 2017, IEEE Communications Surveys & Tutorials.

[3]  Elisa Bertino,et al.  A Lightweight Secure Provenance Scheme for Wireless Sensor Networks , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.

[4]  Jin-Hee Cho,et al.  PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[5]  Adeel Anjum,et al.  Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes , 2017, J. Netw. Comput. Appl..

[6]  Elisa Bertino,et al.  A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[7]  Biplab Sikdar,et al.  BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments , 2018, BlockSys@SenSys.

[8]  Elisa Bertino,et al.  Secure Provenance Transmission for Streaming Data , 2013, IEEE Transactions on Knowledge and Data Engineering.

[9]  Sonia Fahmy,et al.  Energy-efficient provenance transmission in large-scale wireless sensor networks , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[10]  Elisa Bertino,et al.  Sensor Network Provenance Compression Using Dynamic Bayesian Networks , 2017, ACM Trans. Sens. Networks.

[11]  Choong Seon Hong,et al.  Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things , 2018, Comput. Networks.

[12]  Gedare Bloom,et al.  Anomaly-based Intrusion Detection of IoT Device Sensor Data using Provenance Graphs , 2018 .

[13]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[14]  Choong Seon Hong,et al.  Detection of Malicious Node in RPL-Based Internet of Things through Provenance , 2018 .

[15]  Mrs. K. Valarmathi,et al.  A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks , 2016 .

[16]  Elisa Bertino,et al.  Secure data provenance compression using arithmetic coding in wireless sensor networks , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[17]  Sabah Suhail,et al.  Introducing Secure Provenance in IoT: Requirements and Challenges , 2016, 2016 International Workshop on Secure Internet of Things (SIoT).

[18]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[19]  Biplab Sikdar,et al.  Secure Data Provenance for the Internet of Things , 2017, IoTPTS@AsiaCCS.

[20]  Elisa Bertino,et al.  Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.

[21]  R. Ramadan,et al.  IoT Data Provenance Implementation Challenges , 2017, ANT/SEIT.

[22]  Changda Wang,et al.  Cluster-Based Arithmetic Coding for Data Provenance Compression in Wireless Sensor Networks , 2018, Wirel. Commun. Mob. Comput..

[23]  Ramesh Karri,et al.  Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.

[24]  Elisa Bertino,et al.  Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.