2020
DOI: 10.1016/j.comnet.2020.107189
|View full text |Cite
|
Sign up to set email alerts
|

Provenance-enabled packet path tracing in the RPL-based internet of things

Abstract: The interconnection of resource-constrained and globally accessible things with untrusted and unreliable Internet make them vulnerable to attacks including data forging, false data injection, and packet drop that affects applications with critical decisionmaking processes. For data trustworthiness, reliance on provenance is considered to be an effective mechanism that tracks both data acquisition and data transmission. However, provenance management for sensor networks introduces several challenges, such as lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 33 publications
(65 reference statements)
0
11
0
Order By: Relevance
“…Gray Code as data a provenance technique: Data provenance plays a vital role in assuring data trustworthiness (Suhail et al, 2020). Since data are originated by multiple Figure 5 IGTDC framework for trustworthy smart irrigation system.…”
Section: Data Reliability At the Local Aggregatormentioning
confidence: 99%
See 1 more Smart Citation
“…Gray Code as data a provenance technique: Data provenance plays a vital role in assuring data trustworthiness (Suhail et al, 2020). Since data are originated by multiple Figure 5 IGTDC framework for trustworthy smart irrigation system.…”
Section: Data Reliability At the Local Aggregatormentioning
confidence: 99%
“…Gray Code as data a provenance technique: Data provenance plays a vital role in assuring data trustworthiness ( Suhail et al, 2020 ). Since data are originated by multiple sensors’ modules and transmitted to the upstream nodes in IGTDC, by utilizing data provenance, we can trace the data source for data reliability validation, such as which sensor participated in the event detection and vice versa.…”
Section: Igtdc: Trustworthy Data Collection Frameworkmentioning
confidence: 99%
“…The former is provenance technique and the latter is termed as IP traceback technique. In IoT, provenance based RPL packet path tracing is proposed in [187]. In their novel lossless provenance scheme, the authors set a bit in IPv6 extension header, to acquire data generating node and path provenance.…”
Section: Intrusion Response In Iotmentioning
confidence: 99%
“…Globally accessible devices and resource-constrained interconnections via an unreliable and untrusted Internet are vulnerable to attacks using packet drops, false data injection, and data forging, which affect the decision-making processes in applications. The provenance reliance for data trustworthiness is considered an effective method to track data transmission and data acquisition [8,9]. Most traditional global detection methods used in building secure networks focus on the nodes encounter ratio and requires holistic cognition for the network structure.…”
Section: Introductionmentioning
confidence: 99%
“…The efficiency and adaptability of the model is low in the network. The routing protocol method [8] was used for low-power and lossy networks to identify malicious nodes or faults in the nodes. The collected data was analyzed to study the malicious node and improved the efficiency of the model.…”
Section: Introductionmentioning
confidence: 99%