Skip to main content
Log in

RETRACTED ARTICLE: A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 14 June 2022

This article has been updated

Abstract

Multi-hop wireless sensor networks are being implemented in various domains. The collected data are used to make important decisions for censorious infrastructures. Data are processed by a huge quantity of sensor nodes as well as handled on intermediate nodes which are known as hops on the way to the Base Station (BS) which performs the resolution accomplishing. Information have been collected from various sources and intermediate hopes will process and aggregate information. A malevolent opponent may interfere through the information via proposing extra node within the web infrastructure. There are chances to compromising the existing nodes. Malevolent Selective Forwarding attacks are most important protection problem toward the information forwarding within wireless sensor networks (WSN), as this might hinder broadcast of susceptible information as well as it reduces network throughput. Assuring data trustworthiness in this situation has been critical in support of accurate resolution accomplishing. Information provenance signifies a main aspect into analyzing the trustworthiness of wireless sensor data. In this paper we introduce a provenance based technique to determine the attack. Three phases are there in this scheme, detecting packet-loss in the first phase, second phase dealing with identifying attacked sensor node and isolating malevolent sensor node in the third phase. We have included the detailedanalysis of the investigational outcomes for showing the accurateness as well as effectiveness of the proposed system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Change history

References

  • Alam SMI, Fahmy S (2012) An energy-efficient approach for provenance transmission in wireless sensor networks, 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp 130–138

  • Alam SMI, Fahmy S (2014) A practical approach for provenance transmission in wireless sensor networks. Ad Hoc Netw 16:28–45

    Article  Google Scholar 

  • Alam SMI, Fahmy S (2016) A practical approach for provenance transmission in wireless sensor networks. Ad Hoc Netw 16:28–45

    Article  Google Scholar 

  • Alam SMI, Yau DKY, Fahmy S (2014) ERUPT: energy-efficient trustworthy provenance trees for wireless sensor networks, IEEE 33rd international performance computing and communications conference (IPCCC), pp 1–10

  • Basile C, Kalbarczyk Z, Iyer RK (2005) Neutralization of errors and attacks in wireless ad hoc networks, 2005 International conference on dependable systems and networks (DSN'05), Yokohama, Japan, pp 518–527

  • Hameed K et al (2016) A zero watermarking scheme for data integrity in wireless sensor networks, 19th International conference on network-based information systems (NBiS), pp. 119–126

  • Heinzelman W, Chandrahasan A, Balakrishnan H (2000) Energy efficient protocol for wireless micro sensor networks, Hawaii international conference on system sciences, pp 3005–3014

  • Hu YC, Perrig A, Johnson DB (2003) Packet leashes: a defense against wormhole attack in wireless networks, IEEE INFOCOM, pp 1976–1986

  • Hussain SR et al (2014) Secure data provenance compression using arithmetic coding in wireless sensor networks. In: IEEE International Conference on Performance Computing and Communications (IPCCC), pp 1–10

  • Kiran Kumar TVU, Karthik B (2013) Improving network life time using static cluster routing for wireless sensor networks. Indian J Sci Technol 6(5):1–6

    Article  Google Scholar 

  • Laouid A, Dahmani A, Hassen HR et al (2019) A self-managing volatile key scheme for wireless sensor networks. J Ambient Intell Hum Comput 10:3349–3364

    Article  Google Scholar 

  • Lee SJ, Gerla M (2001) Split multipathrouting with maximally disjoint paths in ad hoc networks. IEEE international conference on communications (ICC), pp 3201–3205

  • Lim H, Moon Y, Bertino E (2010) Provenance-based trustworthiness assessment in sensor networks. In: Proceedings of the seventh international workshop on data management for sensor networks (DMSN ’10). ACM, pp 2–7

  • Menon VG, Joe Prathap PM, Vijay A (2016) Eliminating redundant relaying of data packets for efficient opportunistic routing in dynamic wireless ad hoc networks. Asian J Inf Technol 15(20):3991–3994

    Google Scholar 

  • Ramprabu G, Nagarajan S (2015) Design and analysis of novel modified cross layer controller for WMSN. Indian J Sci Technol 8(4):438–444

    Article  Google Scholar 

  • Shaheen AM, Sheltami TR, Al-Kharoubi TM et al (2019) Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Hum Comput 10:4733–4750

    Article  Google Scholar 

  • Sujesh PL, Joe Prathap PM (2015) Security issues in wireless sensor networks—an overview. Int J Comput Sci Inf Technol 6(1):920–924

    Google Scholar 

  • Sujesh PL, Joe Prathap PM (2018a) Safe diffusion of provenance in wireless sensor networks using in-packet bloom filter provenance encoding technique. Int J Eng Technol 7(327):285–289

    Google Scholar 

  • Sujesh PL, Joe Prathap PM (2018b) A novel approach for provenance transmission in wireless sensor networks. J Adv Res Dyn Control Syst 10(3):321–326

    Google Scholar 

  • Sultana S, Ghinita G, Bertino E, Shehab M (2012) A lightweight secure provenance scheme for wireless sensor networks. IEEE international conference on parallel and distributed systems (ICPADS), pp 101–108

  • Sultana S, Shehab M, Bertino E (2013) Secure provenance transmission for streaming data. IEEE Trans Knowl Data Eng 25(8):1890–1903

    Article  Google Scholar 

  • Suriyachai P, Roedig U, Scott A (2012) A survey of MAC protocols for mission-critical applications in wireless sensor networks. IEEE Commun Surv Tutorials 14(2):240–264

    Article  Google Scholar 

  • Wang C, Zheng W, Bertino E (2016) Provenance for wireless sensor networks: a survey. Data Sci Eng 1(3):189–200

    Article  Google Scholar 

  • Yousaf S, Shafi I, Din S, Paul A, Ahmad J (2019) A big data analytical framework for analyzing solar energy receptors using evolutionary computing approach. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-019-01443-7

    Article  Google Scholar 

  • Zhou W, Feri Q, Narayan A, Haeberlen A, Loo BT, Sherr M (2011) Secure network provenance, Proceedings of the 23rd ACM symposium on operating systems principles (SerSOPS’11), pp. 295–310

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sujesh P. Lal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-04147-7

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lal, S.P., Prathap, P.M.J. RETRACTED ARTICLE: A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks. J Ambient Intell Human Comput 12, 5589–5597 (2021). https://doi.org/10.1007/s12652-020-02079-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02079-8

Keywords

Navigation