Khizar Hameed, Junaid Haseeb, M. Tayyab, M. Junaid, Talal Bin Maqsood, Mustahsan Hammad Naqvi
{"title":"无线传感器网络中的安全溯源——溯源方案综述","authors":"Khizar Hameed, Junaid Haseeb, M. Tayyab, M. Junaid, Talal Bin Maqsood, Mustahsan Hammad Naqvi","doi":"10.1109/C-CODE.2017.7918893","DOIUrl":null,"url":null,"abstract":"Data in wireless sensor networks are produced at sensor nodes and it is processed by multiple intermediate nodes until reaches at the base station. The diverse nature of data also highlights its associated security concerns. So, it is very important to assess trustworthiness of data to ensure that only reliable information is used in decision making process. Provenance is the effective technique to assess the trustworthiness of data, since it considers a detailed history of the ownership of data and operations performed on data. Many secure provenance schemes have been proposed in the domain of database, cloud, and workflow systems. A very few such schemes have been proposed in the wireless sensor networks. To best of our knowledge, this is the very first survey that explores the secure provenance schemes in context of addressed challenges, security properties, and detected attacks.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Secure provenance in Wireless Sensor Networks - a survey of provenance schemes\",\"authors\":\"Khizar Hameed, Junaid Haseeb, M. Tayyab, M. Junaid, Talal Bin Maqsood, Mustahsan Hammad Naqvi\",\"doi\":\"10.1109/C-CODE.2017.7918893\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data in wireless sensor networks are produced at sensor nodes and it is processed by multiple intermediate nodes until reaches at the base station. The diverse nature of data also highlights its associated security concerns. So, it is very important to assess trustworthiness of data to ensure that only reliable information is used in decision making process. Provenance is the effective technique to assess the trustworthiness of data, since it considers a detailed history of the ownership of data and operations performed on data. Many secure provenance schemes have been proposed in the domain of database, cloud, and workflow systems. A very few such schemes have been proposed in the wireless sensor networks. To best of our knowledge, this is the very first survey that explores the secure provenance schemes in context of addressed challenges, security properties, and detected attacks.\",\"PeriodicalId\":344222,\"journal\":{\"name\":\"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-03-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/C-CODE.2017.7918893\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/C-CODE.2017.7918893","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure provenance in Wireless Sensor Networks - a survey of provenance schemes
Data in wireless sensor networks are produced at sensor nodes and it is processed by multiple intermediate nodes until reaches at the base station. The diverse nature of data also highlights its associated security concerns. So, it is very important to assess trustworthiness of data to ensure that only reliable information is used in decision making process. Provenance is the effective technique to assess the trustworthiness of data, since it considers a detailed history of the ownership of data and operations performed on data. Many secure provenance schemes have been proposed in the domain of database, cloud, and workflow systems. A very few such schemes have been proposed in the wireless sensor networks. To best of our knowledge, this is the very first survey that explores the secure provenance schemes in context of addressed challenges, security properties, and detected attacks.