[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Rabin Fingerprint-Based Provenance Compression Scheme for Wireless Sensor Network

  • Conference paper
  • First Online:
Mobile Networks and Management (MONAMI 2022)

Abstract

Provenance is considered an effective mechanism to evaluate the reliability of data. To avoid the linear growth of provenances with the growth of the packet transmission path, this paper proposes a provenance compression scheme based on the Rabin fingerprint (RFP). In the RFP scheme, each node uses its identity ID as a seed to generate a fingerprint, the fingerprint is its provenance. When a node on the transmission path receives a packet, it performs a fingerprint connection operation between its provenance and the provenance stored in the packet to generate a new fixed-length fingerprint provenance, and the new provenance is updated to the package. When the base station receives the packet, it will recover the complete transmission path of the packet based on the provenance. Performance analysis and simulation results show that compared with existing provenance compression schemes, the provenance size of the RFP scheme not only does not increase as the path length becomes longer but also has great advantages in storage overhead and energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 63.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 79.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Pottie, G.J., Kaiser, W.J.: Wireless Integrated Network Sensors(WINS): Principles and Practice. Commun. ACM 43(5), 51–53 (2000)

    Article  Google Scholar 

  2. Liu, V., Zhao, Y.: Wireless sensor networks for internet of things: a systematic review and classification. Info. Technol. J. 12(16), 3581–3583 (2013)

    Google Scholar 

  3. Lal, S., Prathap, J.: An energy-efficient lightweight security protocol for optimal resource provenance in wireless sensor networks. Turkish J. Elec. Eng. Comp. Sci. 28(6), 3208–3218 (2020)

    Google Scholar 

  4. Buneman, P., Khanna, S., Tan, W.C., et al.: Why and where: a characterization of data provenance. In: International Conference on Database Theory, pp. 316–330 (2001)

    Google Scholar 

  5. Ramachandran, A., Bhandankar, K., Tariq, M.B., et al.: Packets with Provenance. School of Computer Science Technical Reports, Georgia Institute of Technology (2008)

    Google Scholar 

  6. Dogan, G.: A survey of provenance in wireless sensor net- works. Adhoc&sensor wireless networks 30(1/2), 21–35 (2016)

    Google Scholar 

  7. Xu, Q., Wang, C.: Stepwise refinement provenance scheme for wireless sensor networks. IEEE Internet Things J. 9(13), 11126–11140 (2022)

    Article  Google Scholar 

  8. Wang, C., Hussain, S.R.: Dictionary based secure provenance compression for wireless sensor networks. IEEE Trans. Parallel and Distrib. Sys. 27(2), 405–416 (2016)

    Google Scholar 

  9. Hasan, R., Sion, R., Winslett, M.: The case of the fake Picasso: preventing history forgery with secure provenance. In: Proceedings of the 7th Conference on File and Storage Technologies, San Francisco, Feb 24-27, 2009, pp. 1–14. USENIX Association, Berkeley (2009)

    Google Scholar 

  10. Chaudhari, K.P., Turukmane, A.V.: Dynamic probabilistic packet marking. Mobile Communication and Power Engineering, 381–384 (2013)

    Google Scholar 

  11. Alam, S.M.I., Fahmy, S.: Energy-efficient provenance transmission in large-scale wireless sensor networks. IEEE International Symposium on a World of Wireless, 1–6 (2011)

    Google Scholar 

  12. Sultana, S., Ghinita, G., Bertino, E., et al.: A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks. IEEE Trans. Dependable Secure Comput. 12(3), 256–269 (2015)

    Article  Google Scholar 

  13. Hussain, S.R., Wang, C., Sultana, S.: Secure data provenance compression using arithmetic coding in wireless sensor networks. In: Performance Computing & Communications Conference, pp. 1–10 (2014)

    Google Scholar 

  14. Wang, C., Hussain, S., Bertino, E.: Dictionary based secure provenance compression for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 27(2), 405–418 (2015)

    Article  Google Scholar 

  15. Xu, Q., Zhang, X., Wang, C.: Provenance compression using packet-path-index differences in wireless sensor networks. In: International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), pp. 200–205 (2019)

    Google Scholar 

  16. Sun, J., Chen, H., et al.: Redundant network traffic elimination with GPU accelerated rabin fingerprinting. IEEE Trans. Parallel Distrib. Syst. 27(7), 2130–2142 (2016)

    Article  MathSciNet  Google Scholar 

  17. Lu, P., Randall, O., McDonald, E.: An empirical study of rabin fingerprinting parameters. In: IEEE International Conference on Big Data (Big Data), pp. 3686–3691 (2019)

    Google Scholar 

  18. Zhang, Z., Deng, J.: A secure and effective method for provenance in Wireless Sensor Networks. Computer science and exploration 13(4), 608–619 (2019)

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiming Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, Y., Zhang, Z., Yang, W. (2023). Rabin Fingerprint-Based Provenance Compression Scheme for Wireless Sensor Network. In: Cao, Y., Shao, X. (eds) Mobile Networks and Management. MONAMI 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 474. Springer, Cham. https://doi.org/10.1007/978-3-031-32443-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-32443-7_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-32442-0

  • Online ISBN: 978-3-031-32443-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics