Proceeding
Full conference PDF is available to the subscribed user. Use your subscription login to access,
Cryptographic Provenance Data Protection in IoT and Multi-hop Wireless Sensor Networks
Data in IoT and wireless sensor network environments are produced and processed by various
intermediary sensor nodes until it reaches the base station (BS). The varied character of data also focuses on its
associated security issues. It is extremely important to evaluate factualness and dependability of data to ensure that
only trustworthy information is used in the decision making process. Provenance is the effective strategy to evaluate
the factualness and dependability of data as provenance is considered as a complete record of the ownership of data
and operations performed on data. In this paper, we present a ranking model to assess the trustworthiness of data as
well as the data publishing sensor nodes based on the provenance information. Concerning providing secure and
dependable IoT and WSN systems provenance data needs to be protected against interference and access without
having official permission. In this research article, we propose a new architecture for securing provenance using
cryptographic techniques and access control based on confidentiality schemes.
Inter-Packet Delay, Provenance, Secure Provenance, Sensor Nodes, Trustworthiness
43-46
108763
IMPORTANT DAYS
Paper Submission Last Date
February 19th, 2022
Notification of Acceptance
March 7th, 2022
Camera Ready Paper Submission & Author's Registration
February 19th, 2022
Date of Conference
March 11th, 2022
Publication
March 22nd, 2022