Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC) 2014
DOI: 10.1109/pccc.2014.7017068
|View full text |Cite
|
Sign up to set email alerts
|

Secure data provenance compression using arithmetic coding in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 31 publications
(25 citation statements)
references
References 14 publications
0
25
0
Order By: Relevance
“…In IoT the data transmissed and consumed in very large amount due to increaing number of participants hence huge amount of data will tansmited to achieve efficent storage and processing is difficult due to space complexicity and energy computation.The concept of meta data is used to determne information provenance so tracing data object in big data is become very difficult, [14] conssumption of network banwidth in another issue faced to avoid performance of system 3) Indexing provenance The IoT system likely to large it is very difficult to look each and every data and find name, to avoid this searching datasets of attributes can done to found in meta data depending up on the user the query will change depending u on the goal, another way is indexing can be done in few cases Data Citation can be done but it required efficient lookups in all dimensions to retrieve data.…”
Section: ) Data Processing and Storagementioning
confidence: 99%
See 1 more Smart Citation
“…In IoT the data transmissed and consumed in very large amount due to increaing number of participants hence huge amount of data will tansmited to achieve efficent storage and processing is difficult due to space complexicity and energy computation.The concept of meta data is used to determne information provenance so tracing data object in big data is become very difficult, [14] conssumption of network banwidth in another issue faced to avoid performance of system 3) Indexing provenance The IoT system likely to large it is very difficult to look each and every data and find name, to avoid this searching datasets of attributes can done to found in meta data depending up on the user the query will change depending u on the goal, another way is indexing can be done in few cases Data Citation can be done but it required efficient lookups in all dimensions to retrieve data.…”
Section: ) Data Processing and Storagementioning
confidence: 99%
“…Lineage gives a notion of the quality of GIS datasets based on the source data GIS applications use a cartographic model to transform and derive spatial layers LIP [15] uses a data structure called frame which describes the metadata of a spatial layer. Three types of frames are available: source frame, containing quality information about the source layers, such as scale and projection; command frame, with the commands used to derive intermediate and product layers; and product frames that has metadata specific to the product layers…”
Section: ) Lineage Information Programmentioning
confidence: 99%
“…Hussain et al [11] proposed an arithmetic coding-based provenance (ACP) scheme. Unlike most of the provenance schemes, its provenance size for a packet is not directly proportional to the number of packet transmission hops, but to the occurrence probability of the packet path in the WSN.…”
Section: Acpmentioning
confidence: 99%
“…To address such issues, a distributed message digest scheme, the AM-FM sketch scheme [7] with adjustable output length relating to the false positive rate has been adopted in recent provenance schemes [11,22,23,27]. The AM-FM sketch scheme prevents the binding data's size from growing beyond the range ½ð1 À Þk; ð1 þ Þ2 with probability 1 À d, where k is the sample size of the provenance; 0\d\1 and \1 are the false positive and false negative rates related to k assuming that Oðk !…”
Section: Provenance Bindingmentioning
confidence: 99%
“…Because of the diversity of the environment and the large number of sensor types involved, in order to use the reliable information to make an accurate decision, it is essential to evaluate the trustworthiness of the received data at the base station (BS) of a WSN. In practice, there are some examples of significant losses because the faulty data are used [1].…”
Section: Introductionmentioning
confidence: 99%