Perceive the Packet Drops In Wireless Sensor Networks Using New Secure Cuckoo Filter
Author(s):
G. Rajkumar , R.V.S College of Engineering; J. Lourdu Xavier, R.V.S College of Engineering
Keywords:
Provenance Mechanism, Security Mechanism, Wireless Sensor Networks, Bloom Filter mechanism, Packet forwarding, Cuckoo search algorithm
Abstract:
Bloom Filters are used for high speed set membership tests in large scale sensor networking systems. It allows a small part of false positive answers with very good space effectiveness. However, it does not permit deletion of items from the set, and before attempts to make bigger “standard” Bloom filters to support deletion all degrade of both space or performance. A malicious adversary may initiate further nodes in the network or confrontation previous ones. Therefore, assuring high data responsibility is crucial for correct decision-making. Data provenance represents a key factor in evaluating the responsibility of sensor data. Provenance management for sensor networks introduces more than a few challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. For the reason propose a novel lightweight scheme to securely transmit provenance for sensor data. And introduce resourceful mechanisms for provenance verification and reconstruction at the base station. In addition, it extends the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes, propose a new data structure called the cuckoo filter that can replace Bloom filters for approximate set membership tests. Cuckoo filters support adding and removing items dynamically while achieving even higher performance than Bloom filters.
Other Details:
Manuscript Id | : | IJSTEV2I10017
|
Published in | : | Volume : 2, Issue : 10
|
Publication Date | : | 01/05/2016
|
Page(s) | : | 45-50
|
Download Article