Secure Provenance in Wireless Sensor Networks- A Survey of Provenance Schemes
Data in wireless sensor networks are produced at sensor node and processed by multiple intermediate sensors node until reach at the base station. The diverse nature of data creates the importance of data provenance to assess the trustworthiness of data. Only reliable information is used in decision making process at base station. Provenance is the effective technique to assess the trustworthiness of data, since it considers as detailed history of the ownership of data and operations performed on data. There are many secure provenance schemes have been proposed in the domain of database, cloud, and workflows systems. A very few such schemes have been proposed in the wireless sensor networks. To best of our knowledge, this is the very first survey that explores the secure provenance schemes in context of addressed challenged, security properties and detected attacks.