Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382312
|View full text |Cite
|
Sign up to set email alerts
|

Demonstrating a lightweight data provenance for sensor networks

Abstract: The popularity of sensor networks and their many uses in critical domains such as military and healthcare make them more vulnerable to malicious attacks. In such contexts, trustworthiness of sensor data and their provenance is critical for decision-making. In this demonstration, we present an efficient and secure approach for transmitting provenance information about sensor data. Our provenance approach uses light-weight in-packet Bloom filters that are encoded as sensor data travels through intermediate senso… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 9 publications
(8 reference statements)
0
20
0
Order By: Relevance
“…RPL is a standardized routing protocol for the IP-connected IoT. It creates a Destination-Oriented Directed Acyclic Graph (DODAG) and supports 2 modes of operation (1,2,5,6) in NT and also routing entries (5,6,8,9,10) in RT.…”
Section: Overview Of the Rpl Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…RPL is a standardized routing protocol for the IP-connected IoT. It creates a Destination-Oriented Directed Acyclic Graph (DODAG) and supports 2 modes of operation (1,2,5,6) in NT and also routing entries (5,6,8,9,10) in RT.…”
Section: Overview Of the Rpl Protocolmentioning
confidence: 99%
“…It has many ingredients (for instance, confidentiality, integrity, availability, privacy, and non-repudiation) as discussed in [8]. In wireless sensor networks (WSNs), the idea of incorporating provenance has been discussed in [9]- [15]. In comparison to WSNs, the idea of provenance in the IoT is yet to be explored keeping in view the challenging requirements and constraints associated with the novel architecture of the IoT.…”
mentioning
confidence: 99%
“…Identifying the links that data traverses in a wireless network is examined in [17], which proposes a provenance mechanism where intermediate nodes in a multi-hop sensor network use Bloom filters to imprint path information on transit packets such that the basestation can verify the path of each packet. This has the advantage that it can identify malicious nodes.…”
Section: Prior Workmentioning
confidence: 99%
“…However, if the packet matches one of the offloaded rules, the NetFPGA will drop the packet (it will not be passed to Snort) and trigger Snort to increment the counter associated to that rule. Bloom filter is an efficient data structure which is widely deployed in networking and security applications [29][30]. Bloom filter represents a set of elements that can be used for pattern matching with a certain false positive probability.…”
Section: A Hardware Architecturementioning
confidence: 99%