A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks

Multi-hop wireless sensor networks are being implemented in various domains. The collected data are used to make important decisions for censorious infrastructures. Data are processed by a huge quantity of sensor nodes as well as handled on intermediate nodes which are known as hops on the way to the Base Station (BS) which performs the resolution accomplishing. Information have been collected from various sources and intermediate hopes will process and aggregate information. A malevolent opponent may interfere through the information via proposing extra node within the web infrastructure. There are chances to compromising the existing nodes. Malevolent Selective Forwarding attacks are most important protection problem toward the information forwarding within wireless sensor networks (WSN), as this might hinder broadcast of susceptible information as well as it reduces network throughput. Assuring data trustworthiness in this situation has been critical in support of accurate resolution accomplishing. Information provenance signifies a main aspect into analyzing the trustworthiness of wireless sensor data. In this paper we introduce a provenance based technique to determine the attack. Three phases are there in this scheme, detecting packet-loss in the first phase, second phase dealing with identifying attacked sensor node and isolating malevolent sensor node in the third phase. We have included the detailedanalysis of the investigational outcomes for showing the accurateness as well as effectiveness of the proposed system.

[1]  Sung-Ju Lee,et al.  Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[2]  Shahzad Yousaf,et al.  A big data analytical framework for analyzing solar energy receptors using evolutionary computing approach , 2019, Journal of Ambient Intelligence and Humanized Computing.

[3]  Ravishankar K. Iyer,et al.  Neutralization of errors and attacks in wireless ad hoc networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[4]  B. Karthik,et al.  Improving Network Life Time using Static Cluster Routing for Wireless Sensor Networks , 2013 .

[5]  Nadeem Javaid,et al.  A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks , 2016, 2016 19th International Conference on Network-Based Information Systems (NBiS).

[6]  Elisa Bertino,et al.  Secure Provenance Transmission for Streaming Data , 2013, IEEE Transactions on Knowledge and Data Engineering.

[7]  G. Ramprabu,et al.  Design and Analysis of Novel Modified Cross Layer Controller for WMSN , 2015 .

[8]  Elisa Bertino,et al.  Secure data provenance compression using arithmetic coding in wireless sensor networks , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[9]  Sonia Fahmy,et al.  A practical approach for provenance transmission in wireless sensor networks , 2014, Ad Hoc Networks.

[10]  Tarek R. Sheltami,et al.  Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT , 2019, J. Ambient Intell. Humaniz. Comput..

[11]  Pankaj SECURITY ISSUES IN WIRELESS SENSOR NETWORKS – AN OVERVIEW , 2016 .

[12]  Andreas Haeberlen,et al.  Secure network provenance , 2011, SOSP.

[13]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Elisa Bertino,et al.  Provenance for Wireless Sensor Networks: A Survey , 2016, Data Science and Engineering.

[15]  Elisa Bertino,et al.  Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.

[16]  Sonia Fahmy,et al.  An energy-efficient approach for provenance transmission in wireless sensor networks , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[17]  Abdelkamel Tari,et al.  A self-managing volatile key scheme for wireless sensor networks , 2019, J. Ambient Intell. Humaniz. Comput..

[18]  Utz Roedig,et al.  A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks , 2012, IEEE Communications Surveys & Tutorials.

[19]  Sujesh P Lal,et al.  Safe Diffusion of Provenance in Wireless Sensor Networks Using in-Packet Bloom Filter Provenance Encoding Technique , 2018 .

[20]  David K. Y. Yau,et al.  ERUPT: Energy-efficient trustworthy provenance trees for wireless sensor networks , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[21]  Elisa Bertino,et al.  A Lightweight Secure Provenance Scheme for Wireless Sensor Networks , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.