Khizar Hameed, Junaid Haseeb, M. Tayyab, M. Junaid, Talal Bin Maqsood, Mustahsan Hammad Naqvi
{"title":"Secure provenance in Wireless Sensor Networks - a survey of provenance schemes","authors":"Khizar Hameed, Junaid Haseeb, M. Tayyab, M. Junaid, Talal Bin Maqsood, Mustahsan Hammad Naqvi","doi":"10.1109/C-CODE.2017.7918893","DOIUrl":null,"url":null,"abstract":"Data in wireless sensor networks are produced at sensor nodes and it is processed by multiple intermediate nodes until reaches at the base station. The diverse nature of data also highlights its associated security concerns. So, it is very important to assess trustworthiness of data to ensure that only reliable information is used in decision making process. Provenance is the effective technique to assess the trustworthiness of data, since it considers a detailed history of the ownership of data and operations performed on data. Many secure provenance schemes have been proposed in the domain of database, cloud, and workflow systems. A very few such schemes have been proposed in the wireless sensor networks. To best of our knowledge, this is the very first survey that explores the secure provenance schemes in context of addressed challenges, security properties, and detected attacks.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/C-CODE.2017.7918893","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Data in wireless sensor networks are produced at sensor nodes and it is processed by multiple intermediate nodes until reaches at the base station. The diverse nature of data also highlights its associated security concerns. So, it is very important to assess trustworthiness of data to ensure that only reliable information is used in decision making process. Provenance is the effective technique to assess the trustworthiness of data, since it considers a detailed history of the ownership of data and operations performed on data. Many secure provenance schemes have been proposed in the domain of database, cloud, and workflow systems. A very few such schemes have been proposed in the wireless sensor networks. To best of our knowledge, this is the very first survey that explores the secure provenance schemes in context of addressed challenges, security properties, and detected attacks.