A Comprehensive Method to Secure Time Synchronization in Wireless Sensor
Subject Areas : electrical and computer engineering
1 -
2 -
Abstract :
One of the important requirements of sensor networks is synchronization of the nodes. The importance of time in sensor networks causes the adversary tries to disturb time synchronization by altering and faking messages, delaying or replying them, compromising the nodes and sending false messages via them. Up to now, there is no method that is able to provide both synchronization and security needs of sensor networks simultaneously. In this paper, we suggest a method that is capable to provide precise synchronization, along with low communication and computational overhead, low convergence time and high security against internal and external attacks. Simulation and analytic results show the preference of our method compared to other available methods.
[1] A. Boukerche and D. Turgut, "Secure time synchronization protocols for wireless sensor networks," IEEE J. on Wireless Communications, vol. 14, no. 5, pp. 64-69, Oct. 2007.
[2] J. Elson, L. Girod, and D. Estrin, "Fine-grained network time synchronization using reference broadcasts," ACM SIGOPS Operating Systems Review, vol. 36, no. SI, pp. 147-163, Winter 2002.
[3] S. Ganeriwal, R. Kumar, and M. Srivastava, "Timing-sync protocol for sensor networks," in Proc. of the 1st Int. Conf. on Embedded Networked Sensor Systems, pp. 138-149, 2003.
[4] M. Marti, B. Kusy, and G. Simon, "The flooding time synchronization protocol," in Proc. of the 2nd Int. Conf. on Embedded Networked Sensor Systems, pp. 39-49, 2004.
[5] K. Chen, K. Lui, and Y. Wu, "A greedy distributed time synchronization algorithm for wireless sensor networks," in Proc.IEEE Int. Conf. on Communications, ICC'08, pp. 2327-2331, 19-23 May 2008.
[6] N. Kyoung - lae, E. Serpedin, and K. Qaraqe, "A new approach for time synchronization in wireless sensor networks: pairwise broadcast synchronization," IEEE Trans. on Wireless Communications, vol. 7, no. 9, pp. 3318-3322, Sep. 2008.
[7] N. Kyoung-Lae, Y. C. Wu, and K Qaraqe, "Extension of pairwise broadcast clock synchronization for multicluster sensor networks," EURASIP J. on Advances in Signal Processing, vol. 2008, paper no. 71, Jan. 2008.
[8] S. Ganeriwal, C. Popper, S. Capkun, and M. B. Srivastava, "Secure time synchronization in sensor networks," ACM Trans. on Information and System Security, vol. 11, no. 4, pp. 23-43, 2008.
[9] H. Song, S. Zhu, and G. Cao, "Attack-resilient time synchronization for wireless sensor networks," Ad Hoc Networks, vol. 5, no. 1, pp. 112-125, Jan. 2007.
[10] K. Sun, P. Ning, and C. Wang, "Fault-tolerant cluster-wise clock synchronization for wireless sensor networks," IEEE Trans. on Dependable and Secure Computing, vol. 2, no. 3, pp. 177-189, Jul./Sep. 2005.
[11] K. Sun, P. Ning, and C. Wang, "Secure and resilient clock synchronization in wireless sensor networks," IEEE J. on Selected Areas in Communications, vol. 24, no. 2, pp. 395-408, Feb. 2006.
[12] K. Sun, P. Ning, and C. Wang, "TinySeRSync: secure and resilient time synchronization in wireless sensor networks," in Proc. of the 13th ACM Conf. on Computer and Communications Security, pp. 264-277, 2006.
[13] M. Manzo, T. Roosta, and S. Sastry, "Time synchronization attacks in sensor networks," in Proc. of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 107-116, 2005.
[14] A. Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and secure source authentication for multicast," in Proc. of Network and Distributed System Security Symp., pp. 35-46, Feb. 2001.
[15] J. Barnickel and U. Meyer, "SecSyWiSe: a secure time synchronization scheme in wireless sensor networks," in IEEE Int. Conf. on Ultra Modern Telecommunications, ICUMT, 8 pp., Oct. 2009.
[16] E. Farrugia and R. Simon, "An efficient and secure protocol for sensor network time synchronization," J. of Systems and Software, vol. 79, no. 2, pp. 147-162, Feb. 2006.
[17] K. T. Kim and M. H. Son, "SAEP: secure and accurate and energy-efficient time synchronization in wireless sensor networks," Int. Symp. on Parallel and Distributed Computing, ISPDC, pp. 117-120, Portugal, Jul. 2009.
[18] L. Lamport, R. Shostak, and M. Pease, "The byzantine generals problem," ACM Trans. on Programming Languages and Systems, vol. 4, no. 3, pp. 401-414, Jul. 1982.
[19] ﻫ. صالحي سيچاني، پروتکلهاي احراز اصالت در شبکههاي بيسيم نامتجانس، دانشکده برق و کامپيوتر، دانشگاه صنعتي اصفهان، پاياننامه کارشناسي ارشد، 1386.
[20] L. Chen and J. Leneutre, "Toward secure and scalable time synchronization in ad hoc networks," Computer Communications, vol. 30, no. 11-12, pp. 2453-2467, Sep. 2007.
[21] J. Hoepman, H. A. Larsson, E. M. Schiller, and P. Tsigas, "Secure and self - stabilizing clock synchronization in sensor networks," Lecture Notes in Computer Science, vol. 4838, pp. 340-352, 2007.
[22] K. Sun, Trustworthy and Resilient Time Synchronization in Wireless Sensor Networks, North Carolina State University, Doctoral Dissertation, 2006.
[23] Q. Yujuan and L. Guixiong, "Drifting clock model for network simulation in time synchronization," in Proc. 3rd IEEE Int. Conf. on Innovative Computing Information and Control, pp. 385, 2008.
[24] ز. احمدی، بررسی و تحلیل روشهای همزمانی امن در شبکه حسگر بیسیم، دانشکده برق و کامپيوتر، دانشگاه صنعتي اصفهان، پاياننامه کارشناسي ارشد، 1389.