Secure and resilient clock synchronization in wireless sensor networks

被引:47
|
作者
Sun, K [1 ]
Ning, P
Wang, C
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
[2] USA, Res Off, Res Triangle Pk, NC 27709 USA
基金
美国国家科学基金会;
关键词
computer network security; fault tolerance; synchronization; wireless sensor networks;
D O I
10.1109/JSAC.2005.861396
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network applications. Several clock synchronization schemes have been proposed for wireless sensor networks recently to address the resource constraints in such networks. However, most of these techniques assume benign environments, but cannot survive malicious attacks in hostile environments, especially when there are compromised nodes. As an exception, a recent work attempts to detect malicious attacks against clock synchronization, and aborts when an attack is detected. Though this approach can prevent incorrect clock synchronization due to attacks, it will lead to denial of clock synchronization in such situations. This paper adopts a model where all the sensor nodes synchronize their clocks to a common source, which is assumed to be well synchronized to the external clock. This paper seeks techniques to provide redundant ways for each node to synchronize its clock with the common source, so that it cantolerate partially missing or false synchronization information provided by compromised nodes. Two types of techniques are developed using this general method: level-based clock synchronization and diffusion-based clock synchronization. Targeted at static sensor networks, the level-based clock synchronization constructs a level hierarchy initially, and uses (or reuses) this level hierarchy for multiple rounds of clock synchronization. The diffusion-based clock synchronization attempts to synchronize all the clocks without relying on any structure. assumptions and, thus, can be used for dynamic sensor networks. This paper further investigates how to use multiple clock sources for both approaches to increase the resilience against compromise of source nodes. The,analysis in this paper indicates that both level-based and diffusion-based approaches can tolerate up to s colluding malicious source nodes and t colluding malicious nodes among the neighbors of each normal node, where s and t are two system parameters. This paper also presents the results of simulation studies performed to evaluate the proposed techniques. These results demonstrate that the level-based approach has less overhead and higher precision, but less coverage, than the diffusion-based approach.
引用
收藏
页码:395 / 408
页数:14
相关论文
共 50 条
  • [1] Secure and resilient time synchronization in wireless sensor networks
    Sun, Kun
    Ning, Peng
    Wang, Cliff
    [J]. SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS SENSOR AND AD HOC NETWORKS, 2007, 30 : 347 - +
  • [2] Delay Attack-Resilient Clock Synchronization for Wireless Sensor Networks
    Kim, Eui-Jik
    In, Jeongsik
    Youm, Sungkwan
    Kang, Chul-Hee
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 188 - 191
  • [3] Secure Network-Wide Clock Synchronization in Wireless Sensor Networks
    Robles, Roberto Solis
    Haas, Jason J.
    Chiang, Jerry T.
    Hu, Yih-Chun
    Kumar, P. R.
    [J]. 49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, : 5616 - 5621
  • [4] Clock Synchronization of Wireless Sensor Networks
    Wu, Yik-Chung
    Chaudhari, Qasim
    Serpedin, Erchin
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2011, 28 (01) : 124 - 138
  • [5] A Secure Clock Synchronization Scheme for Wireless Sensor Networks Against Malicious Attacks
    Zhang Xuxin
    Liu Yanzhang
    Zhang Ya
    [J]. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 34 (06) : 2125 - 2138
  • [6] A Secure Clock Synchronization Scheme for Wireless Sensor Networks Against Malicious Attacks
    ZHANG Xuxin
    LIU Yanzhang
    ZHANG Ya
    [J]. Journal of Systems Science & Complexity, 2021, 34 (06) : 2125 - 2138
  • [7] A Secure Clock Synchronization Scheme for Wireless Sensor Networks Against Malicious Attacks
    Xuxin Zhang
    Yanzhang Liu
    Ya Zhang
    [J]. Journal of Systems Science and Complexity, 2021, 34 : 2125 - 2138
  • [8] Secure and resilient localization in wireless sensor networks
    Ning, Peng
    Liu, Donggang
    Du, Wenliang
    [J]. SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS SENSOR AND AD HOC NETWORKS, 2007, 30 : 161 - +
  • [9] Clock Synchronization Simulation for Wireless Sensor Networks
    Ring, Felix
    Nagy, Anetta
    Gaderer, Georg
    Loschmidt, Patrick
    [J]. 2010 IEEE SENSORS, 2010, : 2022 - 2026
  • [10] Clock Synchronization in Wireless Sensor Networks: An Overview
    Rhee, Ill-Keun
    Lee, Jaehan
    Kim, Jangsub
    Serpedin, Erchin
    Wu, Yik-Chung
    [J]. SENSORS, 2009, 9 (01) : 56 - 85