Abstract
Multi-hop wireless sensor networks are being implemented in various domains. The collected data are used to make important decisions for censorious infrastructures. Data are processed by a huge quantity of sensor nodes as well as handled on intermediate nodes which are known as hops on the way to the Base Station (BS) which performs the resolution accomplishing. Information have been collected from various sources and intermediate hopes will process and aggregate information. A malevolent opponent may interfere through the information via proposing extra node within the web infrastructure. There are chances to compromising the existing nodes. Malevolent Selective Forwarding attacks are most important protection problem toward the information forwarding within wireless sensor networks (WSN), as this might hinder broadcast of susceptible information as well as it reduces network throughput. Assuring data trustworthiness in this situation has been critical in support of accurate resolution accomplishing. Information provenance signifies a main aspect into analyzing the trustworthiness of wireless sensor data. In this paper we introduce a provenance based technique to determine the attack. Three phases are there in this scheme, detecting packet-loss in the first phase, second phase dealing with identifying attacked sensor node and isolating malevolent sensor node in the third phase. We have included the detailedanalysis of the investigational outcomes for showing the accurateness as well as effectiveness of the proposed system.
Similar content being viewed by others
Change history
14 June 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s12652-022-04147-7
References
Alam SMI, Fahmy S (2012) An energy-efficient approach for provenance transmission in wireless sensor networks, 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp 130–138
Alam SMI, Fahmy S (2014) A practical approach for provenance transmission in wireless sensor networks. Ad Hoc Netw 16:28–45
Alam SMI, Fahmy S (2016) A practical approach for provenance transmission in wireless sensor networks. Ad Hoc Netw 16:28–45
Alam SMI, Yau DKY, Fahmy S (2014) ERUPT: energy-efficient trustworthy provenance trees for wireless sensor networks, IEEE 33rd international performance computing and communications conference (IPCCC), pp 1–10
Basile C, Kalbarczyk Z, Iyer RK (2005) Neutralization of errors and attacks in wireless ad hoc networks, 2005 International conference on dependable systems and networks (DSN'05), Yokohama, Japan, pp 518–527
Hameed K et al (2016) A zero watermarking scheme for data integrity in wireless sensor networks, 19th International conference on network-based information systems (NBiS), pp. 119–126
Heinzelman W, Chandrahasan A, Balakrishnan H (2000) Energy efficient protocol for wireless micro sensor networks, Hawaii international conference on system sciences, pp 3005–3014
Hu YC, Perrig A, Johnson DB (2003) Packet leashes: a defense against wormhole attack in wireless networks, IEEE INFOCOM, pp 1976–1986
Hussain SR et al (2014) Secure data provenance compression using arithmetic coding in wireless sensor networks. In: IEEE International Conference on Performance Computing and Communications (IPCCC), pp 1–10
Kiran Kumar TVU, Karthik B (2013) Improving network life time using static cluster routing for wireless sensor networks. Indian J Sci Technol 6(5):1–6
Laouid A, Dahmani A, Hassen HR et al (2019) A self-managing volatile key scheme for wireless sensor networks. J Ambient Intell Hum Comput 10:3349–3364
Lee SJ, Gerla M (2001) Split multipathrouting with maximally disjoint paths in ad hoc networks. IEEE international conference on communications (ICC), pp 3201–3205
Lim H, Moon Y, Bertino E (2010) Provenance-based trustworthiness assessment in sensor networks. In: Proceedings of the seventh international workshop on data management for sensor networks (DMSN ’10). ACM, pp 2–7
Menon VG, Joe Prathap PM, Vijay A (2016) Eliminating redundant relaying of data packets for efficient opportunistic routing in dynamic wireless ad hoc networks. Asian J Inf Technol 15(20):3991–3994
Ramprabu G, Nagarajan S (2015) Design and analysis of novel modified cross layer controller for WMSN. Indian J Sci Technol 8(4):438–444
Shaheen AM, Sheltami TR, Al-Kharoubi TM et al (2019) Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Hum Comput 10:4733–4750
Sujesh PL, Joe Prathap PM (2015) Security issues in wireless sensor networks—an overview. Int J Comput Sci Inf Technol 6(1):920–924
Sujesh PL, Joe Prathap PM (2018a) Safe diffusion of provenance in wireless sensor networks using in-packet bloom filter provenance encoding technique. Int J Eng Technol 7(327):285–289
Sujesh PL, Joe Prathap PM (2018b) A novel approach for provenance transmission in wireless sensor networks. J Adv Res Dyn Control Syst 10(3):321–326
Sultana S, Ghinita G, Bertino E, Shehab M (2012) A lightweight secure provenance scheme for wireless sensor networks. IEEE international conference on parallel and distributed systems (ICPADS), pp 101–108
Sultana S, Shehab M, Bertino E (2013) Secure provenance transmission for streaming data. IEEE Trans Knowl Data Eng 25(8):1890–1903
Suriyachai P, Roedig U, Scott A (2012) A survey of MAC protocols for mission-critical applications in wireless sensor networks. IEEE Commun Surv Tutorials 14(2):240–264
Wang C, Zheng W, Bertino E (2016) Provenance for wireless sensor networks: a survey. Data Sci Eng 1(3):189–200
Yousaf S, Shafi I, Din S, Paul A, Ahmad J (2019) A big data analytical framework for analyzing solar energy receptors using evolutionary computing approach. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-019-01443-7
Zhou W, Feri Q, Narayan A, Haeberlen A, Loo BT, Sherr M (2011) Secure network provenance, Proceedings of the 23rd ACM symposium on operating systems principles (SerSOPS’11), pp. 295–310
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-04147-7
About this article
Cite this article
Lal, S.P., Prathap, P.M.J. RETRACTED ARTICLE: A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks. J Ambient Intell Human Comput 12, 5589–5597 (2021). https://doi.org/10.1007/s12652-020-02079-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02079-8