Frequent application is invented to work in network domains of large-scale sensors. Data made up of the wireless sensor network are used to make decisions on serious infrastructure. The data originate from many sources and transmit through intermediate nodes. These nodes achieve aggregation in the information. Attachments of the attacker such networks introduce additional nodes in the network or compromise existing nodes. Therefore, achieving high data reliability is crucial for proper decision making. While evaluating the reliability of the sensor data source is an important factor. The various difficult requirements for provenance management in sensor networks are low-power and low-bandwidth consumption, competent storage space and secure transmission. This survey proposes a new light scheme to reliably transmit the source with sensor data. The future in Block Filters packet techniques used to program the source with the sensor data. These mechanisms initially perform the origin at the base station and then perform the reconstruction of the data at the base station. In addition to this, the ascription scheme functionality used to detect packet drop attacks prepared by malicious data forwarding nodes. These reviews describe the success and efficiency of Lightweight's proven proven scheme in detecting packet forgery with packet loss attacks.