Secure and ultra-reliable provenance recovery in sparse networks: Strategies and performance bounds

Ad Hoc Networks - Tập 131 - Trang 102860 - 2022
Suraj Sajeev1, Manish Bansal2, Sriraam S.V.1, Harshan Jagadeesh2, Huzur Saran1, Yih-Chun Hu3
1Department of Computer Science and Engineering, Indian Institute of Technology, Delhi, India
2Bharti School of Telecommunication Technology and Management, Indian Institute of Technology Delhi, India
3Department of Electrical and Computer Engineering, University of Illinois, Urbana-Champaign, USA

Tài liệu tham khảo

Li, 2018, Spatio-temporal compressive sensing-based data gathering in wireless sensor networks, IEEE Wireless Commun. Lett., 7, 198, 10.1109/LWC.2017.2764899 Salhi, 2009, A new architecture for data collection in vehicular networks, 1 Shen, 2004, Wireless sensor networks for industrial applications, 3636 Raya, 2006, Securing vehicular communications, IEEE Wirel. Commun., 13, 8, 10.1109/WC-M.2006.250352 Hameed, 2017, Secure provenance in wireless sensor networks - a survey of provenance schemes, 11 Hasan, 2009, The case of the fake picasso: Preventing history forgery with secure provenance, 1 Sultana, 2012, A lightweight secure provenance scheme for wireless sensor networks, 101 Čapkun, 2003, Sector: secure tracking of node encounters in multi-hop wireless networks, 21 Whitehouse, 2006, A robustness analysis of multi-hop ranging-based localization approximations, 317 Jagadeesh, 2020, Double-edge embedding based provenance recovery for low-latency applications in wireless networks, IEEE Trans. Dependable Secure Comput., 10.1109/TDSC.2020.3001185 Wisitpongphan, 2007, Routing in sparse vehicular ad hoc wireless networks, IEEE J. Sel. Areas Commun., 25, 1538, 10.1109/JSAC.2007.071005 B. Deb, S. Bhatnagar, B. Nath, A Topology Discovery Algorithm for Sensor Networks with Applications to Network Management, Dept. Comput. Sci. Rutgers Univ. Tech. Rep. DCS-TR-441, 2001. Jawhar, 2017, Efficient topology discovery and routing in thick wireless linear sensor networks, 91 Donnet, 2005, Improved algorithms for network topology discovery, 149 Yu, 2018, Cloud-orchestrated physical topology discovery of large-scale IoT systems using UAVs, IEEE Trans. Ind. Inf., 14, 2261, 10.1109/TII.2018.2796499 Yu, 2016, Physical topology discovery scheme for wireless sensor networks using random walk process, 1 Dhanapala, 2014, Topology preserving maps—extracting layout maps of wireless sensor networks from virtual coordinates, IEEE/ACM Trans. Netw., 22, 784, 10.1109/TNET.2013.2263254 Nezhad, 2008, Efficient topology discovery for multihop wireless sensor networks, 358 Tanabe, 2012, An impersonation attack detection method using bloom filters and dispersed data transmission for wireless sensor networks, 767 Xu, 2011, Traceback in wireless sensor networks with packet marking and logging, Front. Comput. Sci. China, 5, 10.1007/s11704-011-0361-y Shebaro, 2012, Demonstrating a lightweight data provenance for sensor networks, 1022 Sultana, 2015, A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks, IEEE Trans. Dependable Secure Comput., 12, 256, 10.1109/TDSC.2013.44 Sultana, 2011, A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks, 332 Klonowski, 2018, Light-weight and secure aggregation protocols based on bloom filters, Comput. Secur., 72, 107, 10.1016/j.cose.2017.08.015 Alam, 2014, A practical approach for provenance transmission in wireless sensor networks, Ad Hoc Netw., 16, 28, 10.1016/j.adhoc.2013.12.001 Tanabe, 2013, A path authenticating method using bloom filters against impersonation attacks on relaying nodes for wireless sensor networks, 357 Mao, 2013, Connectivity of large wireless networks under a general connection model, IEEE Trans. Inf. Theor., 59, 1761, 10.1109/TIT.2012.2228894 Reis, 2014, Deploying roadside units in sparse vehicular networks: What really works and what does not, IEEE Trans. Veh. Technol., 63, 2794, 10.1109/TVT.2013.2292519 Goodrich, 2008, Probabilistic packet marking for large-scale ip traceback, IEEE/ACM Trans. Netw., 16, 15, 10.1109/TNET.2007.910594 Sy, 2006, Captra: Coordinated packet traceback, 152 Zhang, 2007, Contact-based traceback in wireless sensor networks, 2487 Wang, 2022, Network temperature: A novel statistical index for networks measurement and management, ACM Trans. Internet Technol., 22, 10.1145/3511093 Wu, 2022, Paradise: real-time, generalized, and distributed provenance-based intrusion detection, IEEE Trans. Dependable Secure Comput., 1 Xu, 2021, Stepwise refinement provenance scheme for wireless sensor networks, IEEE Internet Things J., 1 3GPP TS38.211, NR; Physical Channels and Modulation (v15.3.0, Sept.2018). Perkins, 1999, Ad-hoc on-demand distance vector routing, 90 Hu, 2006, Wormhole attacks in wireless networks, IEEE J. Sel. Areas Commun., 24, 370, 10.1109/JSAC.2005.861394 Han, 2014, A general self-organized tree-based energy-balance routing protocol for wireless sensor network, IEEE Trans. Nucl. Sci., 61, 732, 10.1109/TNS.2014.2309351 Xu, 2016, Device fingerprinting in wireless networks: Challenges and opportunities, IEEE Commun. Surv. Tutor., 18, 94, 10.1109/COMST.2015.2476338