Abstract
Provenance is considered an effective mechanism to evaluate the reliability of data. To avoid the linear growth of provenances with the growth of the packet transmission path, this paper proposes a provenance compression scheme based on the Rabin fingerprint (RFP). In the RFP scheme, each node uses its identity ID as a seed to generate a fingerprint, the fingerprint is its provenance. When a node on the transmission path receives a packet, it performs a fingerprint connection operation between its provenance and the provenance stored in the packet to generate a new fixed-length fingerprint provenance, and the new provenance is updated to the package. When the base station receives the packet, it will recover the complete transmission path of the packet based on the provenance. Performance analysis and simulation results show that compared with existing provenance compression schemes, the provenance size of the RFP scheme not only does not increase as the path length becomes longer but also has great advantages in storage overhead and energy consumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Pottie, G.J., Kaiser, W.J.: Wireless Integrated Network Sensors(WINS): Principles and Practice. Commun. ACM 43(5), 51–53 (2000)
Liu, V., Zhao, Y.: Wireless sensor networks for internet of things: a systematic review and classification. Info. Technol. J. 12(16), 3581–3583 (2013)
Lal, S., Prathap, J.: An energy-efficient lightweight security protocol for optimal resource provenance in wireless sensor networks. Turkish J. Elec. Eng. Comp. Sci. 28(6), 3208–3218 (2020)
Buneman, P., Khanna, S., Tan, W.C., et al.: Why and where: a characterization of data provenance. In: International Conference on Database Theory, pp. 316–330 (2001)
Ramachandran, A., Bhandankar, K., Tariq, M.B., et al.: Packets with Provenance. School of Computer Science Technical Reports, Georgia Institute of Technology (2008)
Dogan, G.: A survey of provenance in wireless sensor net- works. Adhoc&sensor wireless networks 30(1/2), 21–35 (2016)
Xu, Q., Wang, C.: Stepwise refinement provenance scheme for wireless sensor networks. IEEE Internet Things J. 9(13), 11126–11140 (2022)
Wang, C., Hussain, S.R.: Dictionary based secure provenance compression for wireless sensor networks. IEEE Trans. Parallel and Distrib. Sys. 27(2), 405–416 (2016)
Hasan, R., Sion, R., Winslett, M.: The case of the fake Picasso: preventing history forgery with secure provenance. In: Proceedings of the 7th Conference on File and Storage Technologies, San Francisco, Feb 24-27, 2009, pp. 1–14. USENIX Association, Berkeley (2009)
Chaudhari, K.P., Turukmane, A.V.: Dynamic probabilistic packet marking. Mobile Communication and Power Engineering, 381–384 (2013)
Alam, S.M.I., Fahmy, S.: Energy-efficient provenance transmission in large-scale wireless sensor networks. IEEE International Symposium on a World of Wireless, 1–6 (2011)
Sultana, S., Ghinita, G., Bertino, E., et al.: A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks. IEEE Trans. Dependable Secure Comput. 12(3), 256–269 (2015)
Hussain, S.R., Wang, C., Sultana, S.: Secure data provenance compression using arithmetic coding in wireless sensor networks. In: Performance Computing & Communications Conference, pp. 1–10 (2014)
Wang, C., Hussain, S., Bertino, E.: Dictionary based secure provenance compression for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 27(2), 405–418 (2015)
Xu, Q., Zhang, X., Wang, C.: Provenance compression using packet-path-index differences in wireless sensor networks. In: International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), pp. 200–205 (2019)
Sun, J., Chen, H., et al.: Redundant network traffic elimination with GPU accelerated rabin fingerprinting. IEEE Trans. Parallel Distrib. Syst. 27(7), 2130–2142 (2016)
Lu, P., Randall, O., McDonald, E.: An empirical study of rabin fingerprinting parameters. In: IEEE International Conference on Big Data (Big Data), pp. 3686–3691 (2019)
Zhang, Z., Deng, J.: A secure and effective method for provenance in Wireless Sensor Networks. Computer science and exploration 13(4), 608–619 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Yang, Y., Zhang, Z., Yang, W. (2023). Rabin Fingerprint-Based Provenance Compression Scheme for Wireless Sensor Network. In: Cao, Y., Shao, X. (eds) Mobile Networks and Management. MONAMI 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 474. Springer, Cham. https://doi.org/10.1007/978-3-031-32443-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-031-32443-7_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-32442-0
Online ISBN: 978-3-031-32443-7
eBook Packages: Computer ScienceComputer Science (R0)