Professional Documents
Culture Documents
technique both analytically and empirically, and the results prove the effectiveness
and efficiency of the lightweight secure provenance scheme in detecting packet
forgery and loss attacks.
EXISTING SYSTEM:
Recent research highlighted the key contribution of provenance in systems
where the use of untrustworthy data may lead to catastrophic failures (e.g.,
SCADA systems). Although provenance modeling, collection, and querying
have been studied extensively for workflows and curated databases,
provenance in sensor networks has not been properly addressed.
DISADVANTAGES OF EXISTING SYSTEM:
Traditional provenance security solutions use intensively cryptography and
digital signatures, and they employ append-based data structures to store
provenance, leading to prohibitive costs.
Existing research employs separate transmission channels for data and
provenance.
PROPOSED SYSTEM:
SYSTEM ARCHITECTURE:
Data Gathering
Transmission to Sink
Sink
Cluster Head
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System
Hard Disk
40 GB.
Floppy Drive
1.44 Mb.
Monitor
15 VGA Colour.
Mouse
Logitech.
Ram
512 Mb.
SOFTWARE REQUIREMENTS:
Operating system :
Windows XP/7/LINUX.
Implementation
NS2
NS2 Version:
NS2.2.28
Front End
OTCL
(Object
Oriented
Tool
Command
Language)
Tool
REFERENCE:
Salmin Sultana, Gabriel Ghinita, Member, IEEE , Elisa Bertino, Fellow, IEEE , and
Mohamed Shehab, Member, IEEE Computer Society, A Lightweight Secure
Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless
Sensor Networks, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE
COMPUTING, VOL. 12, NO. 3, MAY/JUNE 2015.