SlideShare a Scribd company logo
1 of 5
Download to read offline
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
LIGHTWEIGHT SECURE SCHEME FOR DETECTING
PROVENANCE FORGERY AND PACKET DROP ATTACKS IN
WIRELESS SENSOR NETWORKS
Abstract:
A comprehensive sensor networks are deployed in many application domains, and the
data collections are used in decision making for critical infrastructures. Data are travelled from
multiple sources through intermediate processing nodes that aggregate information. Data
provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance
management for sensor networks introduces several challenging requirements, such as low
energy and bandwidth consumption, efficient storage and secure transmission. Propose a novel
lightweight scheme to securely transmit provenance for sensor data. The proposed technique
relies on in packet Bloom filters to encode provenance. Also introduce efficient mechanisms for
attribution verification and reconstruction at the base station. Also our system implementation
enlarges the sheltered provenance scheme with functionality to identify packet drop attacks
staged by malicious data forwarding nodes. Additionally evaluate the proposed technique both
logically and empirically, and the results show the effectiveness and efficiency of the lightweight
secure provenance scheme in detecting packet imitation and packet loss.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Introduction:
Sensor networks are used in numerous application domains, such as cyber physical
infrastructure systems, environmental monitoring, power grids, etc. Data are produced at a large
number of sensor node sources and processed in-network at intermediate hops on their way to a
base station (BS) that performs decision-making.
The diversity of data sources creates the need to assure the trustworthiness of data, such
that only trustworthy information is considered in the decision process. Data provenance is an
effective method to assess data trustworthiness, since it summarizes the history of ownership and
the actions performed on the data.
In a multi-hop sensor network, data provenance allows the BS to trace the source and
forwarding path of an individual data packet. Provenance must be recorded for each packet, but
important challenges arise due to the tight storage, energy and bandwidth constraints of sensor
nodes. Therefore, it is necessary to devise a light-weight provenance solution with low overhead.
Furthermore, sensors often operate in an un-trusted environment, where they may be subject to
attacks.
To address security requirements such as confidentiality, integrity and freshness of
provenance is implemented. Our goal is to design a provenance encoding and decoding
mechanism that satisfies such security and performance needs.
A provenance encoding strategy is developed where by each node on the path of a data
packet securely embeds provenance information within a Bloom filter (BF) that is transmitted
along with the data.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Upon receiving the packet, the BS extracts and verifies the provenance information. We
also devise an extension of the provenance encoding scheme that allows the BS to detect if a
packet drop attack was staged by a malicious node.
Existing System:
Analysis of Existing System is opposed to existing research that employs separate
transmission channels for data and provenance, which require a single channel for both.
Furthermore, traditional provenance security solutions use intensively cryptography and digital
signatures, and they employ append-based data structures to store provenance, leading to
prohibitive costs. In contrast, we use only fast message authentication code (MAC) schemes
and Bloom filters, which are fixed-size data structures that compactly represent provenance.
Bloom filters make efficient usage of bandwidth, and they yield low error rates in practice.
Disadvantages:
 Data paths may change over time by time , e.g., due to node failure.
 Data transmission delay.
 System accessed by the attackers due to security violence.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Proposed System:
A multi-hop wireless sensor network is consisting of a number of sensor nodes and a base
station that collects data from the network. The network is modeled as a graph. The set of nodes
and L is the set of links, containing an element for each pair of nodes that are communicating
directly with each other. Each sensor generates data periodically, and individual values are
aggregated towards the BS using any existing hierarchical (i.e., tree-based) dissemination
scheme.
Each data packet contains 1) a unique packet sequence number, 2) a data value, and 3)
provenance. The sequence number is attached to the packet by the data source, and all nodes use
the same sequence number for a given round.
Let us consider node-level provenance, which encodes the nodes at each step of data
processing. This representation has been used in previous research for trust management and for
detecting selective forwarding attacks.
Given packet d, its provenance is modeled as a directed acyclic graph where each vertex
is attributed to a specific node and represents the provenance record (i.e., node ID) for that node.
Each vertex in the provenance graph is uniquely identified by a vertex ID (VID) which is
generated by the host node using cryptographic hash functions. The edge set E consists of
directed edges that connect sensor nodes.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Advantages:
 Propose an in-packet Bloom filter (iBF) provenance- encoding scheme identifies the
packet dropping attacks safe and quick way.
 Design efficient techniques for provenance decoding and verification at the base station.
 Extend the secure provenance encoding scheme and devise a mechanism that detects
packet drop attacks staged by malicious forwarding sensor nodes.
 Perform a detailed security analysis and performance evaluation of the proposed
provenance encoding scheme and packet loss detection mechanism.

More Related Content

Viewers also liked (6)

Keteladanan rasulullah-saw-periode-mekah
Keteladanan rasulullah-saw-periode-mekahKeteladanan rasulullah-saw-periode-mekah
Keteladanan rasulullah-saw-periode-mekah
 
Xe đạp thể thao có khóa chống trộm
Xe đạp thể thao có khóa chống trộmXe đạp thể thao có khóa chống trộm
Xe đạp thể thao có khóa chống trộm
 
Nowości czytelnicze cz.2
Nowości czytelnicze cz.2Nowości czytelnicze cz.2
Nowości czytelnicze cz.2
 
VIRA catalog
VIRA catalogVIRA catalog
VIRA catalog
 
Etwinning Workshop for Young Tourism
Etwinning Workshop for Young TourismEtwinning Workshop for Young Tourism
Etwinning Workshop for Young Tourism
 
Life Under the Big Tent-Making Festivals Work
Life Under the Big Tent-Making Festivals WorkLife Under the Big Tent-Making Festivals Work
Life Under the Big Tent-Making Festivals Work
 

More from kitechsolutions

More from kitechsolutions (9)

Identity based encryption
Identity based encryptionIdentity based encryption
Identity based encryption
 
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
 
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
 
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio NetworksToward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithms
 
BDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware MonitoringBDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware Monitoring
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks

  • 1. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS Abstract: A comprehensive sensor networks are deployed in many application domains, and the data collections are used in decision making for critical infrastructures. Data are travelled from multiple sources through intermediate processing nodes that aggregate information. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. Propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in packet Bloom filters to encode provenance. Also introduce efficient mechanisms for attribution verification and reconstruction at the base station. Also our system implementation enlarges the sheltered provenance scheme with functionality to identify packet drop attacks staged by malicious data forwarding nodes. Additionally evaluate the proposed technique both logically and empirically, and the results show the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet imitation and packet loss.
  • 2. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Introduction: Sensor networks are used in numerous application domains, such as cyber physical infrastructure systems, environmental monitoring, power grids, etc. Data are produced at a large number of sensor node sources and processed in-network at intermediate hops on their way to a base station (BS) that performs decision-making. The diversity of data sources creates the need to assure the trustworthiness of data, such that only trustworthy information is considered in the decision process. Data provenance is an effective method to assess data trustworthiness, since it summarizes the history of ownership and the actions performed on the data. In a multi-hop sensor network, data provenance allows the BS to trace the source and forwarding path of an individual data packet. Provenance must be recorded for each packet, but important challenges arise due to the tight storage, energy and bandwidth constraints of sensor nodes. Therefore, it is necessary to devise a light-weight provenance solution with low overhead. Furthermore, sensors often operate in an un-trusted environment, where they may be subject to attacks. To address security requirements such as confidentiality, integrity and freshness of provenance is implemented. Our goal is to design a provenance encoding and decoding mechanism that satisfies such security and performance needs. A provenance encoding strategy is developed where by each node on the path of a data packet securely embeds provenance information within a Bloom filter (BF) that is transmitted along with the data.
  • 3. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Upon receiving the packet, the BS extracts and verifies the provenance information. We also devise an extension of the provenance encoding scheme that allows the BS to detect if a packet drop attack was staged by a malicious node. Existing System: Analysis of Existing System is opposed to existing research that employs separate transmission channels for data and provenance, which require a single channel for both. Furthermore, traditional provenance security solutions use intensively cryptography and digital signatures, and they employ append-based data structures to store provenance, leading to prohibitive costs. In contrast, we use only fast message authentication code (MAC) schemes and Bloom filters, which are fixed-size data structures that compactly represent provenance. Bloom filters make efficient usage of bandwidth, and they yield low error rates in practice. Disadvantages:  Data paths may change over time by time , e.g., due to node failure.  Data transmission delay.  System accessed by the attackers due to security violence.
  • 4. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Proposed System: A multi-hop wireless sensor network is consisting of a number of sensor nodes and a base station that collects data from the network. The network is modeled as a graph. The set of nodes and L is the set of links, containing an element for each pair of nodes that are communicating directly with each other. Each sensor generates data periodically, and individual values are aggregated towards the BS using any existing hierarchical (i.e., tree-based) dissemination scheme. Each data packet contains 1) a unique packet sequence number, 2) a data value, and 3) provenance. The sequence number is attached to the packet by the data source, and all nodes use the same sequence number for a given round. Let us consider node-level provenance, which encodes the nodes at each step of data processing. This representation has been used in previous research for trust management and for detecting selective forwarding attacks. Given packet d, its provenance is modeled as a directed acyclic graph where each vertex is attributed to a specific node and represents the provenance record (i.e., node ID) for that node. Each vertex in the provenance graph is uniquely identified by a vertex ID (VID) which is generated by the host node using cryptographic hash functions. The edge set E consists of directed edges that connect sensor nodes.
  • 5. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Advantages:  Propose an in-packet Bloom filter (iBF) provenance- encoding scheme identifies the packet dropping attacks safe and quick way.  Design efficient techniques for provenance decoding and verification at the base station.  Extend the secure provenance encoding scheme and devise a mechanism that detects packet drop attacks staged by malicious forwarding sensor nodes.  Perform a detailed security analysis and performance evaluation of the proposed provenance encoding scheme and packet loss detection mechanism.