{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:33:33Z","timestamp":1763458413187,"version":"3.45.0"},"reference-count":25,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,1,26]],"date-time":"2018-01-26T00:00:00Z","timestamp":1516924800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1111512 and CICI-1547358"],"award-info":[{"award-number":["CNS-1111512 and CICI-1547358"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61672269"],"award-info":[{"award-number":["61672269"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Jiangsu Provincial Science and Technology Project","award":["BA2015161"],"award-info":[{"award-number":["BA2015161"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2017,2,28]]},"abstract":"<jats:p>Provenance records the history of data acquisition and transmission. In wireless sensor networks (WSNs), provenance is critical for many different purposes, including assessing the trustworthiness of data acquired and forwarded by sensors, supporting situation awareness, and detecting early signs of attacks. However, a major drawback in provenance for WSNs is its size. It is thus critical to develop efficient techniques for provenance encoding. A major issue of previously proposed provenance encoding techniques is that the size of the provenance either expands too fast with increases in the number of packet transmission hops or is very sensitive to the WSN\u2019s topology, i.e., the size of the provenance expands drastically with changes in the WSN\u2019s topology. In this article, we propose a novel provenance encoding technique based on dynamic Bayesian network and overlapped arithmetic coding scheme, which addresses such an issue. Through theoretical analysis, simulation, and testbed experiments, we show that our scheme outperforms other WSN lightweight provenance schemes with respect to provenance size and energy consumption.<\/jats:p>","DOI":"10.1145\/2997653","type":"journal-article","created":{"date-parts":[[2017,1,27]],"date-time":"2017-01-27T13:40:58Z","timestamp":1485524458000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Sensor Network Provenance Compression Using Dynamic Bayesian Networks"],"prefix":"10.1145","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7024-4559","authenticated-orcid":false,"given":"Changda","family":"Wang","sequence":"first","affiliation":[{"name":"Jiangsu University, Zhenjiang"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]}],"member":"320","published-online":{"date-parts":[[2017,1,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2011.5986127"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4379079"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/579090"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/30.6.541"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312289"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.368958"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2529988"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056143"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 7th Conference on File and Storage Technologies (FAST\u201909)","author":"Hasan Ragib","year":"2009","unstructured":"Ragib Hasan, Radu Sion, and Marianne Winslett. 2009. The case of the fake Picasso: Preventing history forgery with secure provenance. In Proceedings of the 7th Conference on File and Storage Technologies (FAST\u201909). 1--14. http:\/\/dl.acm.org\/citation.cfm?id&equals;1525908.1525909"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2014.7017068"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858158.1858162"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060303"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454630.1454636"},{"key":"e_1_2_1_14_1","volume-title":"Introduction to Probability Models","author":"Ross Sheldon M.","unstructured":"Sheldon M. Ross. 2006. Introduction to Probability Models (9th ed.). Elsevier Science and Technology, Singapore.","edition":"9"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056107"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382312"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.54"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2012.24"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.44"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.31"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/WESCAN.1993.270518"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2402156"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/214762.214771"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055934"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2997653","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2997653","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2997653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:23:25Z","timestamp":1763457805000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2997653"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,26]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2,28]]}},"alternative-id":["10.1145\/2997653"],"URL":"https:\/\/doi.org\/10.1145\/2997653","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2017,1,26]]},"assertion":[{"value":"2015-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-09-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-01-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}