Evaluating Time Synchronization Using Application-Layer Time-Stamping

被引:0
|
作者
Al-Kofahi, Osameh [1 ]
机构
[1] Yarmouk Univ, Dept Comp Engn, Irbid, Jordan
关键词
Wireless Sensor Networks; Time Synchronization; Application-Layer Time Stamping; Arduino; XBee; CLOCK SYNCHRONIZATION; SENSOR; ALGORITHMS;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Time synchronization is an important topic in wireless sensor networks (WSNs) and in networking in general. Most of the synchronization algorithms in WSNs are sender-receiver protocols that involve some message exchange between a pair of nodes to calculate the difference in local clocks (clock drifts). Such protocols rely on MAC-Layer time stamping to reduce synchronization errors to a minimum. Although very accurate, such approaches need intervention in lower layers of the network stack to enable MAC-Layer time stamping of the exchanged packets, which makes applying such protocols hard or even impossible on some platforms. In this paper, we study time synchronization using application-layer time stamping only which relieves the requirement of MAC-layer time stamping. We introduce a simple protocol and implement it on Arduino and XBee. Our results show that sub-millisecond accuracy can be achieved on average for a 3-hop network, and that interference can increase the average synchronization error slightly over 1 ms. We believe such accuracy level is acceptable for a wide-range of applications in WSNs especially.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Time-stamping and counting of single photons using fast camera
    Nomerotski, Andrei
    2020 PHOTONICS NORTH (PN), 2020,
  • [22] TimepixCam: a fast optical imager with time-stamping
    Fisher-Levine, M.
    Nomerotski, A.
    JOURNAL OF INSTRUMENTATION, 2016, 11
  • [23] Universally composable time-stamping schemes with audit
    Buldas, A
    Laud, P
    Saarepera, M
    Willemson, J
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 359 - 373
  • [24] On Universal Composable Security of Time-Stamping Protocols
    Matsuo, Toshihiko
    Matsuo, Shin'ichiro
    APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 169 - 181
  • [25] Offline Time-Stamping Using TPM and Its Java']Java Library
    Kakei, Shohei
    Mohri, Masami
    Shiraishi, Yoshiaki
    Noguchi, Ryoji
    2012 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE 2012), 2012,
  • [26] A two-level time-stamping system
    Gabillon, A
    Byun, J
    TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 139 - 149
  • [27] Evaluation of Synchronization Protocols for fine-grain HPC sensor data time-stamping and collection
    Libri, Antonio
    Bartolini, Andrea
    Magno, Michele
    Benini, Luca
    2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 818 - 825
  • [28] Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis
    Ni, Tongguang
    Gu, Xiaoqing
    Wang, Hongyuan
    Li, Yu
    JOURNAL OF CONTROL SCIENCE AND ENGINEERING, 2013, 2013
  • [29] New time-stamping scheme using mutual communications with pseudonymous clients
    Yamada, A
    Kiyomoto, S
    Tanaka, T
    Nakao, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (01): : 182 - 189
  • [30] On optimal hash tree traversal for interval time-stamping
    Lipmaa, H
    INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 357 - 371