{"title":"基于信任评估的wsn来源伪造和丢包攻击检测","authors":"Henna Thesnim, M. Nithin","doi":"10.1109/I2C2.2017.8321838","DOIUrl":null,"url":null,"abstract":"Numerous application domains use large scale sensor networks and they collect data that are used in decision making for critical infrastructures. Data are transmitted from multiple sources through intermediate nodes which aggregates the information. Sometimes there is a chance of malicious attack in the network and may introduce additional nodes in the network or compromise existing ones. Since this causes problems in correct decision making, providing data trustworthiness plays an important role in wireless sensor networks (WSN). Provenance management can cause several challenging requirements such as storage, bandwidth, energy etc. So here a trust evaluation in detection of provenance forgery is introduced. The proposed technique relies on in packet bloom filter to encode the provenance data. Also the provenance scheme is extended to detect the packet drop attack staged by the malicious nodes. Along with that trust management such as communication trust, energy trust and direct trust are also done to improve the efficiency of system.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Trust evaluation in detection of provenance forgery and packet drop attacks in WSNs\",\"authors\":\"Henna Thesnim, M. Nithin\",\"doi\":\"10.1109/I2C2.2017.8321838\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Numerous application domains use large scale sensor networks and they collect data that are used in decision making for critical infrastructures. Data are transmitted from multiple sources through intermediate nodes which aggregates the information. Sometimes there is a chance of malicious attack in the network and may introduce additional nodes in the network or compromise existing ones. Since this causes problems in correct decision making, providing data trustworthiness plays an important role in wireless sensor networks (WSN). Provenance management can cause several challenging requirements such as storage, bandwidth, energy etc. So here a trust evaluation in detection of provenance forgery is introduced. The proposed technique relies on in packet bloom filter to encode the provenance data. Also the provenance scheme is extended to detect the packet drop attack staged by the malicious nodes. Along with that trust management such as communication trust, energy trust and direct trust are also done to improve the efficiency of system.\",\"PeriodicalId\":288351,\"journal\":{\"name\":\"2017 International Conference on Intelligent Computing and Control (I2C2)\",\"volume\":\"106 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Intelligent Computing and Control (I2C2)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I2C2.2017.8321838\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Intelligent Computing and Control (I2C2)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I2C2.2017.8321838","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trust evaluation in detection of provenance forgery and packet drop attacks in WSNs
Numerous application domains use large scale sensor networks and they collect data that are used in decision making for critical infrastructures. Data are transmitted from multiple sources through intermediate nodes which aggregates the information. Sometimes there is a chance of malicious attack in the network and may introduce additional nodes in the network or compromise existing ones. Since this causes problems in correct decision making, providing data trustworthiness plays an important role in wireless sensor networks (WSN). Provenance management can cause several challenging requirements such as storage, bandwidth, energy etc. So here a trust evaluation in detection of provenance forgery is introduced. The proposed technique relies on in packet bloom filter to encode the provenance data. Also the provenance scheme is extended to detect the packet drop attack staged by the malicious nodes. Along with that trust management such as communication trust, energy trust and direct trust are also done to improve the efficiency of system.