Forgery and Packet Drop Detection Using BloomFilter Mechanism in Wireless Sensor Network

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2016 by IJETT Journal
Volume-35 Number-4
Year of Publication : 2016
Authors : Shruthy H.N, Nagamani D.R


Shruthy H.N, Nagamani D.R"Forgery and Packet Drop Detection Using BloomFilter Mechanism in Wireless Sensor Network", International Journal of Engineering Trends and Technology (IJETT), V35(4),156-159 May 2016. ISSN:2231-5381. published by seventh sense research group

In Many application domains, large scale sensor networks are being deployed to collect sensor data that can be used in decision making for critical infrastructures. A malicious adversary may introduce a malicious node into the network or may compromise the existing legitimate node within the network. Hence, ensuring trustworthiness of data is necessary for effective decision making. Data provenance is a key factor in evaluating trustworthiness of data in sensor network. But, Provenance management in sensor network faces several challenges like low energy, storage and bandwidth consumption, limited resources, and adversary attack during transmission. In this paper, a novel lightweight scheme is proposed to securely transmit provenance data in wireless sensor network. The proposed technique uses in-packet bloom filter to encode provenance data. We introduce efficient mechanism for provenance verification and reconstruction of provenance at base station. Also the scheme is extended with additional functionality to detect packet drop attacks staged by consecutive malicious nodes, forwarding the data. We evaluate the proposed technique both analytically and empirically, and the results obtained using proposed scheme proves to be effective in detecting forgery and packet loss in multiple consecutive malicious sensor nodes.


[1] Salmin Sultana, Gabriel Ghinita, Elisa Bertino and Mohamed Shehab, “Alightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireles Sensor Networks,” IEEE Transactions on Dependable and Secure computing, vol.12, No.3, May/June 2015.
[2] Vikash Kumar, Anshu Jain, and P.N.Barwal, “Wireless Sensor Networks: Security Issues, Challenges and Solutions,” International Journal of Information and Computing Technology, ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 859-868.
[3] Hani Alzaid, Ernest Foo and Juan Gonzalez Nieto, “Secure Data Aggregation in Wireless Sensor Network: A Survey,” Information Security Institute, Qeensland University of Technology, PO Box 2434, Brisbane, Queensland 4001.
[4] GowriShankar.S, T.G. Bsavaraju, Manjaiah D.H, and Subir Kumar Sarkar, “Issues in Wireless Sensor Networks,” Proceedings of the World Congress on Engineering 2008 Vol I, WCE 2008, July 2- 4, 2008, London, U.K.
[5] Salmin Sultana, Elisa Bertino, Mohamed Shehab, “A Provenance Based mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks,” Proceedings of the 2011 International Conferrence on Distributed Computing Systems Workshops, pages.332-338, 2011.
[6] Adam kirsch, Michael Mitzenmacher, “Less Hashing, Same Performance: Building a better Bloom Filter,” accepted 11 july 2007, Published online 15 May 2008 in Wiley Inter Science.

wireless sensor network, provenance data, bloom filter, security.