SINCE 2004

  • 0

      0 Item in Bag


      Your Shopping bag is empty

      CHECKOUT
  • Notice

    • ALL COMPUTER, ELECTRONICS AND MECHANICAL COURSES AVAILABLE…. PROJECT GUIDANCE SINCE 2004. FOR FURTHER DETAILS CALL 9443117328

    Projects > COMPUTER > 2019 > NON IEEE > APPLICATION

    Detecting Provenance Forgery and Packet Drop Attacks


    Abstract

    Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. Here propose method a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. The proposed method introduces efficient mechanisms for provenance verification and reconstruction at the base station. In addition extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. To evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.


    Existing System

    In Existing system the data is send to the Base Station(BS) to trace the path of an individual data packet But the challenge is tight storage, Energy and Bandwidth should be consider The Another drawback is sensor often operate in an untrusted environment it leads to attacks Confidentiality and integrity is not provided in existing system.


    Proposed System

    Secure provenance transmission in sensor network Light-weight provenance encoding and decoding scheme based on Bloom filters. The propose method an in-packet Bloom filter (iBF) provenance encoding scheme. Distributed mechanism is used to encode provenance at the nodes and a centralized algorithm to decode it at the BS. Each packet consists of a unique sequence number, data value in iBF Secure provenance encoding scheme that detects packet drop attacks staged by malicious forwarding sensor nodes Proposed scheme is effective, light-weight and scalable.The proposed method achieves the robust provision mechanism provenance encoding and decoding is maintained in this project. For maintaining all this possibilities iBF is used to setup for the phase. The proposed scheme is effective, light-weight and scalable. In future work plan to implement a real system prototype of our secure provenance scheme, and to improve the accuracy of packet loss detection, especially in the case of multiple consecutive malicious sensor nodes.


    Architecture


    ARCHITECTURE DIAGRAM


    FOR MORE INFORMATION CLICK HERE