Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Network

Author(s): D.Thalapathi, P.Chidambaranathan, R.Latha

Abstract:   For numerous applications large-scale sensor networksare deployed. The data collected in these applications are used for critical infrastructures in decision making. Streamed data from multiple sources through intermediate nodes are obtained as aggregate information. Malicious adversary is introduced as additional nodes in the network. Data provenance allows the base station to trace the source and to forward the path of an individual data packet. Provenance must be recorded for each packet, but important challenges arise due to the tight storage, energy and bandwidth constraints of sensor nodes. Furthermore, sensors often operate in an entrusted environment, where they may be subject to attacks. Hence, it is necessary to address security requirements such as confidentiality, integrity and freshness of provenance. The goal is to design a provenance encoding and decoding mechanism that satisfies such security and performance needs. This research propose a provenance encoding strategy whereby each node on the path of a data packet securely embeds provenance information within a Bloom Filter that is transmitted along with the data. Upon receiving the packet, the base station extracts and verifies the provenance information. It also devise an extension of the provenance encoding scheme that allows the BS to detect if a packet drop attack was staged by a malicious data forwarding nodes.