Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Data Compression in Dictionary Based secure Provenance for Wireless Sensor Networks

Author : Vishwa Prasath T S 1 Rajasekar P 2

Date of Publication :31st December 2017

Abstract: Remote sensor systems are spatially dispersed sensor hubs that monitor the physical or ecological conditions like sound, push waves, the temperature of encompassing and so on, and furthermore send the detected information back to the sink or base station.WSN are utilized as a part of numerous applications like military regions, debacle administration in remote regions, in building keen urban communities and so forth. In this manner security is an essential angle in WSN. These systems can be inclined to different sad assaults or programmers that have the intention to upset the whole system. In a commonplace WSN organize, the minor hubs introduced in various areas since the encompassing condition, send the gathered information to their neighbours, which thusly is sent to a sink hub. The sink hub total the information got from various sensors and send it to the base station for additionally handling and vital activities. The data’s source, also packet and provenance binds with AM-FM sketch and uses secure packet sequence generation technique. Everything is fine here, but the data is not compressed, hence data compression part will be done using Lempel-Ziv method.

Reference :

    1. H.- S. Lim, Y.- S. Moon, and E. Bertino, "Provenancebased trust-value appraisal in sensor systems," in Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, ser. DMSN '10, 2010, pp. 2– 7.
    2. S. Sultana, G. Ghinita, E. Bertino, and M. Shehab, "A lightweight secure provenance conspire for remote sensor systems," in IEEE eighteenth International Conference on Parallel and Distributed Systems (ICPADS), 2012, pp. 101– 108
    3. I. Encourage, J. Vockler, M. Wilde, and Y. Zhao, "Delusion: A virtual information framework for speaking to, questioning, and robotizing information induction," in fourteenth International Conference on Scientific and Statistical Database Management, 2002, 2002, pp. 37– 46.
    4. K.- K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. I. Seltzer, "Provenance-mindful capacity frameworks." in USENIX Annual Technical Conference, General Track, 2006, pp. 43– 56.
    5. S. M. I. Alam and S. Fahmy, "Vitality effective provenance trans-mission in vast scale remote sensor systems," in IEEE Inter-national Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2011, pp. 1– 6.
    6. B. Shebaro, S. Sultana, S. Reddy Gopavaram, and E. Bertino, "Exhibiting a lightweight information provenance for sensor net-works," in Proceedings of the 2012 ACM meeting on Computer and interchanges security, 2012, pp. 1022– 1024.
    7. A.- H. Jallad and T. Vladimirova, "Information centricity in remote sen-sor systems," in Guide to Wireless Sensor Networks, ser. PC Communications and Networks. Springer London, 2009, pp. 183– 204.
    8. D. Mama, "Secure input benefit in remote sensor systems," in Information Security Practice and Experience, ser. Address Notes in Computer Science, vol. 4464. Springer Berlin Heidelberg, 2007, Book Section, pp. 116– 128.

Recent Article