Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1298239.1298258acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Secure, accurate and precise time synchronization for wireless sensor networks

Published: 22 October 2007 Publication History

Abstract

Secure time synchronization is a key service for wireless sensor networks (WSN). The special nature of WSNs imposes challenging and intertwined requirements on secure time synchronization design. We show that secure time synchronization techniques proposed to date fail to fulfil the security, accuracy, precision and energy-cost required trade-off for WSNs. We propose a novel pairwise and clusterwise-based approach to securely synchronize nodes of a WSN. We develop a meshed network of cluster heads to securely transfer global time among cluster heads. Then, in turn, cluster heads transfer global time to the nodes of each cluster. The analysis in this paper shows that this approach exhibits very advanced security, accuracy, precision and low-energy trade-off. Moreover, this approach can equally be applied to star or peer-to-peer-based clustered WSNs.

References

[1]
J. A. Gutierrez, E. Callaway and R. Barrett. Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensors with IEEE 802.15.4. ISBN: 0-7381-3557-7, 2003.
[2]
SmartRF CC2420 Datasheet (rev 1.3), 2005-10-03. http://www.chipcon.com/ les/CC2420 Data Sheet 1 3.pdf.
[3]
S. Ganeriwal, S. Capkun, C. Han, and M. B. Srivastava. Secure time synchronization service for sensor networks. In Proc. of 2005 ACM Workshop on Wireless Security, pp. 97--106, 2005
[4]
M. Manzo, T. Roosta, and S. Sastry. Time synchronization attacks in sensor networks. In Proc. of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 107--116, 2005.
[5]
H. Song, S. Zhu, and G. Cao. Attack-resilient time synchronization for wireless sensor networks. In Proc. of IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2005.
[6]
K. Sun, P. Ning, and C. Wang. Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2), February 2006.
[7]
K. Sun, P. Ning, C. Wang, A. Liu and Y. Zhou. TinySeRSync: Secure and resilient Time Synchronization in Wireless Sensor Networks. In Proc. of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, November 2006.
[8]
Y.C. Hu, A. Perrig, and D.B. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proc. of INFOCOM 2003, April 2003.
[9]
J. Elson, L. Girod, and D. Estrin. Fine-grained network time synchronization using reference broadcasts. ACM SIGOPS Operating Systems Review, 36:147--163, 2002.
[10]
S. Ganeriwal, R. Kumar, and M. B. Srivastava. Timing-sync protocol for sensor networks. In Proc. of the First International Conference on Embedded Networked Sensor Systems, pp. 138--149, 2003.
[11]
Maroti, M., Kusy, B., Simon, G., Ledeczi, A. The Flooding Synchronization Protocol. Proc. Of the Second ACM Conference on Embedded Networked Sensor Systems, November 2004.
[12]
Hwang, J. and Kim, Y. 2004. Revisiting random key pre-distribution schemes for wireless sensor networks. In Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 43--52, October 2004).
[13]
Y-C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In Proc. of The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies. April 2003.
[14]
Y. W. Fahmy, S. Shro, N.B. Optimal Sleep/Wake Scheduling for Time-Synchronized Sensor Networks with QoS Guarantees. In Proc. of the 14th IEEE International Workshop on Quality of Service, 2006. 2006.
[15]
J. R. Vig. Introduction to Quartz Frequency Standards. Technical report SLCET-TR-92-1 (Rev. 1). 1992.
[16]
Ganeriwal, S., Ganesan, D., Shim, H., Tsiatsis, V., and Srivastava, M. B. Estimating clock uncertainty for efficient duty-cycling in sensor networks. In Proc. of the 3rd international Conference on Embedded Networked Sensor Systems, pp. 130--141, 2005.
[17]
D. Sánchez and H. Baldus. A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks. In Proc. of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks. 277--288. 2005.
[18]
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. (1992) 471--486.
[19]
S. A. Camtepe and B. Yener: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. In Proc. of Computer Security- ESORICS. 293--308, 2004.
[20]
O. Younis and S. Fahmy, "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks," IEEE Transactions on Mobile Computing, volume 3, issue 4, pp. 366--379, 2004.
[21]
D. Sanchez. Key Management for Wireless Ad hoc Networks. IKMZ BTU Cottbus. PhD Thesis. 2006.
[22]
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J.D. Tygar. SPINS: Security Protocols for Sensor Networks. Mobicom 2001, July 2001.
[23]
Romer, K. Mattern, F. The design space of wireless sensor networks. IEEE Wireless Communications, Vol. 11, Issue 6, pp. 54--61. 2004.

Cited By

View all

Index Terms

  1. Secure, accurate and precise time synchronization for wireless sensor networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    Q2SWinet '07: Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
    October 2007
    192 pages
    ISBN:9781595938060
    DOI:10.1145/1298239
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 October 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. security
    2. time synchronization
    3. wireless sensor networks

    Qualifiers

    • Article

    Conference

    MSWiM07
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 46 of 131 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media