K.M. Anandkumar, S. Priyadarshini, Accurate Detection of Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks, Asian Journal of Information Technology, Volume 15,Issue 20, 2016, Pages 3980-3985, ISSN 1682-3915, ajit.2016.3980.3985, (https://makhillpublications.co/view-article.php?doi=ajit.2016.3980.3985) Abstract: Wireless sensor networks are used in numerous application domains such as cyber physical infrastructure systems, environmental monitoring etc. Data are produced at a large number of sensor nodes which are deployed in a hostile environment. Data are processed in-network at intermediate hops on their way to a Base Station (BS) to perform decision-making. The data should be trustworthy such that only trustworthy information is considered in the decision process. A malicious adversary may introduce malicious nodes in the network or compromise existing ones and they can modify the data. Data trust worthiness can be assessed by data provenance, since it summarizes the history of ownership and actions performed on the data. Therefore a lightweight secure scheme is used to securely transmit provenance for sensor data. Lightweight secure provenance scheme relies on in-packet Bloom filters to encode provenance. The provenance schema introduces the efficient mechanisms for provenance verification at the base station. Secure provenance scheme is extended with a functionality to detect packet drop attacks staged by malicious nodes. Keywords: Data provenance;security;bloom filter;wireless sensor networks;attacks