A Blockchain-Based Scheme for Secure Data Provenance in Wireless Sensor Networks

被引:7
作者
Zeng, Yu [1 ]
Zhang, Xing [1 ]
Akhtar, Rizwan [1 ]
Wang, Changda [1 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang, Jiangsu, Peoples R China
来源
2018 14TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2018) | 2018年
基金
美国国家科学基金会;
关键词
provenance; WSN; blockchain; TRANSMISSION;
D O I
10.1109/MSN.2018.00009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks (WSNs), provenance is vital for assessing data's trustworthiness, detecting the misbehaviors conducted by adversaries or troubleshooting communication failures. The provenance can be encoded through fingerprinting the node IDs along a packet path where the packets are generated, forwarded and/or aggregated. Because WSNs are resource-tightened networks, most of the known provenance schemes applied in WSNs address the issues on how to reduce the provenance size with various compression techniques only. However, reducing the provenance size at a sensor node also costs too much energy. In addition, such schemes did not take the secure and persistant provenance storage for consideration in a long term. To fill the gap, we propose a blockchain-based data provenance scheme (BCP) of compression free, where the provenances are stored distributively on the nodes along the packet path and the BS can retrieve the provenance on demand through a query process. An edge computing based monitor network consisting of high performance nodes (H-nodes) is deployed above or nearby the WSNs, which keeps the WSN's provenance data in a blockchain-based database. The security and authenticity of the provenances are then protected. What's more, the WSN is released from consuming much energy in handling provenance data, which is more superior to all the previous schemes. Both the simulation and experiment results show that our scheme BCP is more energy efficient and secure than those of the known distributed data provenances.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 16 条
[1]   A practical approach for provenance transmission in wireless sensor networks [J].
Alam, S. M. Iftekharul ;
Fahmy, Sonia .
AD HOC NETWORKS, 2014, 16 :28-45
[2]  
Benet J., 2014, IPFS CONTENT ADDRESS, V3
[3]  
Du M., 2016, MASTERING BITCOIN, V50
[4]   IEEE 802.11S: THE WLAN MESH STANDARD [J].
Hiertz, Guido R. ;
Denteneer, Dee ;
Max, Sebastian ;
Taori, Rakesh ;
Cardona, Javier ;
Berlemann, Lars ;
Walke, Bernhard .
IEEE WIRELESS COMMUNICATIONS, 2010, 17 (01) :104-111
[5]  
Hussain S, 2014, CELL POLYM, V33, P1
[6]   Mathematical programming: Turing completeness and applications to software analysis [J].
Liberti, Leo ;
Marinelli, Fabrizio .
JOURNAL OF COMBINATORIAL OPTIMIZATION, 2014, 28 (01) :82-104
[7]  
Shebaro B., 2012, P 2012 ACM C COMP CO, P1022
[8]   Edge Computing: Vision and Challenges [J].
Shi, Weisong ;
Cao, Jie ;
Zhang, Quan ;
Li, Youhuizi ;
Xu, Lanyu .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (05) :637-646
[9]   A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks [J].
Sultana, Salmin ;
Ghinita, Gabriel ;
Bertino, Elisa ;
Shehab, Mohamed .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (03) :256-269
[10]   Secure Provenance Transmission for Streaming Data [J].
Sultana, Salmin ;
Shehab, Mohamed ;
Bertino, Elisa .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (08) :1890-1903