1 research outputs found

    A FROTHY ENDANGERED SYSTEM FOR IDENTIFYING ATTRIBUTION FAKE AND PACK DRIP ROUNDS IN WIRELESS SENSOR NETWORKS

    Get PDF
    Data provenance represents an important consider evaluating the standing of sensor data. Large-scale sensor systems are deployed in lots of application domains, combined with the data they collect be employed in decision-creating critical infrastructures. A malicious foe may introduce additional nodes inside the network or compromise existing ones. Therefore, assuring high data trustworthiness is essential for correct decision-making. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. Provenance management for sensor systems introduces several challenging needs, for instance low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we advise a manuscript lightweight intend to securely transmit provenance for sensor data. The recommended technique is dependent upon in packet Blossom filters to encode provenance. We introduce efficient mechanisms for provenance verification and renovation within the base station. Additionally, we extend the secure provenance plan with functionality to understand packet drop attacks staged by malicious data forwarding nodes. We look at the recommended technique both analytically and empirically, combined with the results prove the success and efficiency inside the lightweight secure provenance intend to find packet forgery and loss attacks
    corecore