TY - JOUR T1 - Accurate Detection of Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks AU - Anandkumar, K.M. AU - Priyadarshini, S. JO - Asian Journal of Information Technology VL - 15 IS - 20 SP - 3980 EP - 3985 PY - 2016 DA - 2001/08/19 SN - 1682-3915 DO - ajit.2016.3980.3985 UR - https://makhillpublications.co/view-article.php?doi=ajit.2016.3980.3985 KW - Data provenance KW -security KW -bloom filter KW -wireless sensor networks KW -attacks AB - Wireless sensor networks are used in numerous application domains such as cyber physical infrastructure systems, environmental monitoring etc. Data are produced at a large number of sensor nodes which are deployed in a hostile environment. Data are processed in-network at intermediate hops on their way to a Base Station (BS) to perform decision-making. The data should be trustworthy such that only trustworthy information is considered in the decision process. A malicious adversary may introduce malicious nodes in the network or compromise existing ones and they can modify the data. Data trust worthiness can be assessed by data provenance, since it summarizes the history of ownership and actions performed on the data. Therefore a lightweight secure scheme is used to securely transmit provenance for sensor data. Lightweight secure provenance scheme relies on in-packet Bloom filters to encode provenance. The provenance schema introduces the efficient mechanisms for provenance verification at the base station. Secure provenance scheme is extended with a functionality to detect packet drop attacks staged by malicious nodes. ER -