Data provenance in Wireless Sensor Networks (WSNs): A review

Ariz Muhammad Brohi, Y. A. Malkani, M. S. Chandio
{"title":"Data provenance in Wireless Sensor Networks (WSNs): A review","authors":"Ariz Muhammad Brohi, Y. A. Malkani, M. S. Chandio","doi":"10.1109/ICOMET.2018.8346374","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Networks (WSNs) has been an active area of research since last two decades. A wireless sensor network is consisting of huge number of small, inexpensive and resource constrained devices called sensing nodes. These sensor nodes are densely deployed to measure a given physical phenomenon. Currently, there exist enormous applications of WSNs in various domains, such as health care (e.g. patient monitoring and assistance), environmental monitoring (e.g. weather forecast, forest fire detection), natural disasters (e.g. flood detection and monitoring, earth quick), military (e.g. military equipment monitoring/surveillance, battle field management), business (e.g. products monitoring and tracking) and smart homes (e.g. monitoring and controlling home appliances). Note that in all above mentioned applications of WSNs, the organizations / enterprises or even individuals take critical decisions on the basis of gathered data from WSNs. We advocate that if the gathered data is accurate and trustworthy, the decisions taken based on that data might be correct, otherwise it will guide the organizations/enterprises in erroneous direction. Since, in WSNs the sensor nodes are interconnected with each other through some wireless channel and use most of the time multi hop ad hoc topology, it makes them vulnerable to various security threats and one of the less addressed security threat of WSNs is the data provenance. It represents one of the key issues in examining the trustworthiness of sensor's data. Thus, the focus of this paper is to provide a detailed review of the state-of-the-art data provenance schemes for wireless sensor networks (WSNs). This paper could serve as a beginning guide for the researchers who just started to explore the domain of data provenance for WSNs.","PeriodicalId":381362,"journal":{"name":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOMET.2018.8346374","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Wireless Sensor Networks (WSNs) has been an active area of research since last two decades. A wireless sensor network is consisting of huge number of small, inexpensive and resource constrained devices called sensing nodes. These sensor nodes are densely deployed to measure a given physical phenomenon. Currently, there exist enormous applications of WSNs in various domains, such as health care (e.g. patient monitoring and assistance), environmental monitoring (e.g. weather forecast, forest fire detection), natural disasters (e.g. flood detection and monitoring, earth quick), military (e.g. military equipment monitoring/surveillance, battle field management), business (e.g. products monitoring and tracking) and smart homes (e.g. monitoring and controlling home appliances). Note that in all above mentioned applications of WSNs, the organizations / enterprises or even individuals take critical decisions on the basis of gathered data from WSNs. We advocate that if the gathered data is accurate and trustworthy, the decisions taken based on that data might be correct, otherwise it will guide the organizations/enterprises in erroneous direction. Since, in WSNs the sensor nodes are interconnected with each other through some wireless channel and use most of the time multi hop ad hoc topology, it makes them vulnerable to various security threats and one of the less addressed security threat of WSNs is the data provenance. It represents one of the key issues in examining the trustworthiness of sensor's data. Thus, the focus of this paper is to provide a detailed review of the state-of-the-art data provenance schemes for wireless sensor networks (WSNs). This paper could serve as a beginning guide for the researchers who just started to explore the domain of data provenance for WSNs.
无线传感器网络(WSNs)中的数据来源研究进展
无线传感器网络(WSNs)是近二十年来研究的一个活跃领域。无线传感器网络由大量小型、廉价和资源受限的设备组成,这些设备被称为传感节点。这些传感器节点被密集地部署以测量给定的物理现象。目前,无线传感器网络在各个领域都有大量的应用,例如医疗保健(例如患者监测和援助)、环境监测(例如天气预报、森林火灾探测)、自然灾害(例如洪水探测和监测、地球快速)、军事(例如军事装备监测/监视、战场管理)、商业(例如产品监测和跟踪)和智能家居(例如家用电器的监测和控制)。请注意,在上述所有wsn的应用中,组织/企业甚至个人都是根据从wsn收集的数据做出关键决策的。我们主张,如果收集到的数据是准确可信的,那么基于这些数据做出的决策可能是正确的,否则它将引导组织/企业走向错误的方向。由于在无线传感器网络中,传感器节点之间通过一些无线通道相互连接,并且大多数时候使用多跳自组织拓扑,这使得它们容易受到各种安全威胁,其中较少解决的安全威胁之一是数据来源。它是检验传感器数据可信度的关键问题之一。因此,本文的重点是为无线传感器网络(wsn)提供最新的数据来源方案的详细回顾。本文可以作为刚开始探索无线传感器网络数据来源领域的研究人员的入门指南。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信