International Journal of Emerging Trends & Technology in Computer Science
A Motivation for Recent Innovation & Research
ISSN 2278-6856
www.ijettcs.org

Call for Paper, Published Articles, Indexing Infromation Survey on Provenance Forgery attack and detection methods in Wireless Sensor Network , Authors : Ashutosh Bajpei, Prof. Geetika Narang, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), www.ijettcs.org
Volume & Issue no: Volume 5, Issue 1, January - February 2016

Title:
Survey on Provenance Forgery attack and detection methods in Wireless Sensor Network
Author Name:
Ashutosh Bajpei, Prof. Geetika Narang
Abstract:
Abstract Wireless Sensor Network is widely used in many application domains. These nodes collect data from many sensor nodes. This data is first passes through the intermediate node and then can be aggregated at single node. This collected data is used for decision making. The security, integrity and confidentiality of the transmitted data are the most important part in the WSN transmission. There are many possible attacks like provenance forgery, Packet drop attack, DDos attack, Jamming attack etc. are found in the WSN while transmitting the data. Data provenance keeps log information of data about who accessed this data, who modified this data, the path from the data is traversed etc. Data provenance has important role in the evaluation of trustworthiness of data therefore, it is important to secure data provenance. This paper surveys different approaches existed in literature for securing the data provenance. Keywords: Wireless sensor network, Provenance forgery attack, Bloom Filter, Data Provenance,
Cite this article:
Ashutosh Bajpei, Prof. Geetika Narang , " Survey on Provenance Forgery attack and detection methods in Wireless Sensor Network " , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 5, Issue 1, January - February 2016 , pp. 051-053 , ISSN 2278-6856.
Full Text [PDF]                          Home