A Blockchain-Based Scheme for Secure Data Provenance in Wireless Sensor Networks

被引:7
|
作者
Zeng, Yu [1 ]
Zhang, Xing [1 ]
Akhtar, Rizwan [1 ]
Wang, Changda [1 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang, Jiangsu, Peoples R China
基金
美国国家科学基金会;
关键词
provenance; WSN; blockchain; TRANSMISSION;
D O I
10.1109/MSN.2018.00009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks (WSNs), provenance is vital for assessing data's trustworthiness, detecting the misbehaviors conducted by adversaries or troubleshooting communication failures. The provenance can be encoded through fingerprinting the node IDs along a packet path where the packets are generated, forwarded and/or aggregated. Because WSNs are resource-tightened networks, most of the known provenance schemes applied in WSNs address the issues on how to reduce the provenance size with various compression techniques only. However, reducing the provenance size at a sensor node also costs too much energy. In addition, such schemes did not take the secure and persistant provenance storage for consideration in a long term. To fill the gap, we propose a blockchain-based data provenance scheme (BCP) of compression free, where the provenances are stored distributively on the nodes along the packet path and the BS can retrieve the provenance on demand through a query process. An edge computing based monitor network consisting of high performance nodes (H-nodes) is deployed above or nearby the WSNs, which keeps the WSN's provenance data in a blockchain-based database. The security and authenticity of the provenances are then protected. What's more, the WSN is released from consuming much energy in handling provenance data, which is more superior to all the previous schemes. Both the simulation and experiment results show that our scheme BCP is more energy efficient and secure than those of the known distributed data provenances.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [31] A secure and efficient data aggregation scheme for wireless sensor networks
    Zhu, Wen Tao
    Gao, Fei
    Xiang, Yang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1414 - 1430
  • [32] An Efficient Secure Data Aggregation Scheme for Wireless Sensor Networks
    Ben Othman, Soufiene
    Alzaid, Hani
    Trad, Abdelbasset
    Youssef, Habib
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 49 - 52
  • [33] Secure Data Aggregation Scheme in Wireless Sensor Networks for IoT
    Alghamdi, Ahmed
    Alshamrani, Mesfar
    Alqahtani, Abdullah
    Al Ghamdi, Sultan Safar A.
    Harrathi, Rami
    2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2016,
  • [34] SFedChain: Blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks
    Meng, Mingming
    Li, Yuancheng
    PeerJ Computer Science, 2022, 8
  • [35] SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks
    Meng, Mingming
    Li, Yuancheng
    PEERJ, 2022, 8
  • [36] SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks
    Meng, Mingming
    Li, Yuancheng
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [37] A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks
    Hasan, Khalid
    Chowdhury, Mohammad Jabed Morshed
    Biswas, Kamanashis
    Ahmed, Khandakar
    Islam, Md. Saiful
    Usman, Muhammad
    COMPUTER NETWORKS, 2022, 211
  • [38] Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey
    Ramasamy, Lakshmana Kumar
    Khan, Firoz K. P.
    Imoize, Agbotiname Lucky
    Ogbebor, Joshua O.
    Kadry, Seifedine
    Rho, Seungmin
    IEEE ACCESS, 2021, 9 : 128765 - 128785
  • [39] Secure Data Provenance Compression Using Arithmetic Coding in Wireless Sensor Networks
    Hussain, Syed Rafiul
    Wang, Changda
    Sultana, Salmin
    Bertino, Elisa
    2014 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2014,
  • [40] Secure Provenance in Wireless Sensor Networks-A Survey of Provenance Schemes
    Hameed, Khizar
    Haseeb, Junaid
    Tayyab, Muhammad
    Junaid, Muhammad
    Bin Maqsood, Talal
    Naqvi, Mustahsan Hammad
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 11 - 16