Dictionary Based Secure Provenance Compression for Wireless Sensor Networks

被引:26
作者
Wang, Changda [1 ,2 ]
Hussain, Syed Rafiul [2 ]
Bertino, Elisa [2 ,3 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Nanjing, Jiangsu, Peoples R China
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[3] Purdue Univ, Cyber Ctr, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
Provenance; dictionary based compression; sensor network;
D O I
10.1109/TPDS.2015.2402156
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to energy and bandwidth limitations of wireless sensor networks (WSNs), it is crucial that data provenance for these networks be as compact as possible. Even if lossy compression techniques are used for encoding provenance information, the size of the provenance increases with the number of nodes traversed by the network packets. To address such issues, we propose a dictionary based provenance scheme. In our approach, each sensor node in the network stores a packet path dictionary. With the support of this dictionary, a path index instead of the path itself is enclosed with each packet. Since the packet path index is a code word of a dictionary, its size is independent of the number of nodes present in the packet's path. Furthermore, as our scheme binds the packet and its provenance through an AM-FM sketch and uses a secure packet sequence number generation technique, it can defend against most of the known provenance attacks. Through simulation and experimental results, we show that our scheme outperforms other compact provenance schemes with respect to provenance size, robustness, and energy consumption.
引用
收藏
页码:405 / 418
页数:14
相关论文
共 22 条
  • [1] [Anonymous], 2011, P 2011 IEEE INT S WO
  • [2] [Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
  • [3] Foster I, 2002, 14TH INTERNATIONAL CONFERENCE ON SCIENTIFIC AND STATISTICAL DATABASE MANAGEMENT, PROCEEDINGS, P37, DOI 10.1109/SSDM.2002.1029704
  • [4] Garofalakis M, 2007, PROC INT CONF DATA, P971
  • [5] Hasan R., 2009, P 7 USENIX C FIL STO, P1
  • [6] Ihara S., 1993, Information theory for Continuous Systems
  • [7] Jallad A.-H., 2009, COMPUT COMMUN, P183
  • [8] Levis P., 2003, SENSYS 03, P126, DOI DOI 10.1145/958491.958506
  • [9] Lim H., 2010, Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, P2, DOI DOI 10.1145/1858158.1858162
  • [10] TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    Liu, An
    Ning, Peng
    [J]. 2008 INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS, 2008, : 245 - 256