Provenance Compression Using Packet-Path-Index Differences in Wireless Sensor Networks

In wireless sensor networks (WSNs), provenance is critical for assessing the trustworthiness of data acquired and forwarded by sensor nodes, detecting early signs of attacks, etc. However, the provenance size expands rapidly with increases in the number of packet transmission hops. Among the existing provenance schemes, the dictionary based provenance scheme (DP) achieves the highest provenance compression rate. However, the major drawback of the DP scheme is that it is sensitive to the WSN's topology changes, which cannot be used in the WSNs with rapid topology changes. To overcome such a drawback and achieve a higher compression rate, we propose a path index differences based provenance scheme, in which we first establish backbone paths along the gradient direction, and then we devise a Truncation Hamming Distance (THD) based method to eliminate the backbone paths with high similarity and build the path dictionaries for the selected backbone paths of low similarity. With the support of such dictionaries, a new path is encoded by the index of a similar path in the dictionary together with the differences between them, which makes the size of the provenance stably compressed. Compared to the DP scheme, the simulation and experimental results show that our scheme can achieve a higher provenance compression ratio even if the topology structure of the WSN is not stable.

[1]  Spiridon Bakiras,et al.  Secure Similar Document Detection with Simhash , 2013, Secure Data Management.

[2]  Wei Dong,et al.  Pathfinder: Robust path reconstruction in large scale sensor networks with lossy links , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).

[3]  Wei Dong,et al.  Understanding Path Reconstruction Algorithms in Multihop Wireless Networks , 2019, IEEE/ACM Transactions on Networking.

[4]  Elisa Bertino,et al.  Sensor Network Provenance Compression Using Dynamic Bayesian Networks , 2017, ACM Trans. Sens. Networks.

[5]  Moses Charikar,et al.  Similarity estimation techniques from rounding algorithms , 2002, STOC '02.

[6]  Philip Levis,et al.  CTP , 2013, ACM Trans. Sens. Networks.

[7]  Enrico Perla,et al.  PowerTOSSIM z: realistic energy modelling for wireless sensor network environments , 2008, PM2HW2N '08.

[8]  Sonia Fahmy,et al.  A practical approach for provenance transmission in wireless sensor networks , 2014, Ad Hoc Networks.

[9]  Dongming Lu,et al.  Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing , 2014, IEEE/ACM Transactions on Networking.

[10]  Elisa Bertino,et al.  Demonstrating a lightweight data provenance for sensor networks , 2012, CCS '12.

[11]  Elisa Bertino,et al.  Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.

[12]  Elisa Bertino,et al.  Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[13]  Elisa Bertino,et al.  Provenance for Wireless Sensor Networks: A Survey , 2016, Data Science and Engineering.

[14]  Elisa Bertino,et al.  A Lightweight Secure Provenance Scheme for Wireless Sensor Networks , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.

[15]  Andrew W. Moore,et al.  Bayesian networks for lossless dataset compression , 1999, KDD '99.

[16]  Elisa Bertino,et al.  Secure data provenance compression using arithmetic coding in wireless sensor networks , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[17]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[18]  Sonia Fahmy,et al.  Energy-efficient provenance transmission in large-scale wireless sensor networks , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.