Attack-resilient time synchronization for wireless sensor networks

The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first identify various attacks that are effective to several representative time synchronization schemes, and then focus on a specific type of attack called delay attack, which cannot be addressed by cryptographic techniques. Next we propose two approaches to detect and accommodate the delay attack. Our first approach uses the generalized extreme studentized deviate (GESD) algorithm to detect multiple outliers introduced by the compromised nodes; our second approach uses a threshold derived using a time transformation technique to filter out the outliers. Finally we show the effectiveness of these two schemes through extensive simulations

[1]  Danny Dolev,et al.  Fault-tolerant clock synchronization , 1984, PODC '84.

[2]  Deborah Estrin,et al.  Time synchronization for wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[3]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[4]  P. M. Melliar-Smith,et al.  Byzantine clock synchronization , 1984, PODC '84.

[5]  Kang G. Shin,et al.  Fault-Tolerant Clock Synchronization in Large Multicomputer Systems , 1994, IEEE Trans. Parallel Distributed Syst..

[6]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[7]  Yingyu Wan,et al.  Accurate Time Synchronization for Wireless Sensor Networks , 2005, MSN.

[8]  Kay Römer Time synchronization in ad hoc networks , 2001, MobiHoc '01.

[9]  A. Föhrenbach,et al.  SIMPLE++ , 2000, OR Spectr..

[10]  Teri A. Crosby,et al.  How to Detect and Handle Outliers , 1993 .

[11]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[12]  Saurabh Ganeriwal,et al.  Timing-sync protocol for sensor networks , 2003, SenSys '03.

[13]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[14]  J. Elson,et al.  Fine-grained network time synchronization using reference broadcasts , 2002, OSDI '02.

[15]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[16]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[17]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[18]  Guohong Cao,et al.  Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[19]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[20]  Qun Li,et al.  Global Clock Synchronization in Sensor Networks , 2006, IEEE Trans. Computers.

[21]  Douglas M. Hawkins Identification of Outliers , 1980, Monographs on Applied Probability and Statistics.

[22]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[23]  Jan M. Rabaey,et al.  Lightweight time synchronization for sensor networks , 2003, WSNA '03.

[24]  Peng Ning,et al.  Fault-tolerant cluster-wise clock synchronization for wireless sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[25]  P. M. Melliar-Smith,et al.  Synchronizing clocks in the presence of faults , 1985, JACM.

[26]  Amit Kumar Saha,et al.  Adaptive clock synchronization in sensor networks , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[27]  Amit Kumar Saha,et al.  Adaptive clock synchronization in sensor networks , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[28]  Guohong Cao,et al.  Optimizing tree reconfiguration to track mobile targets in sensor networks , 2003, MOCO.

[29]  David L. Mills,et al.  Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..

[30]  Guohong Cao,et al.  DCTC: dynamic convoy tree-based collaboration for target tracking in sensor networks , 2004, IEEE Transactions on Wireless Communications.

[31]  Mihail L. Sichitiu,et al.  Simple, accurate time synchronization for wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[32]  Jason Keith Redi,et al.  On the use of directional antennas for sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[33]  B. Rosner Percentage Points for a Generalized ESD Many-Outlier Procedure , 1983 .

[34]  Mike Chen,et al.  Security and Deployment Issues in a Sensor Network , 2000 .

[35]  Sushil Jajodia,et al.  LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.

[36]  Sencun Zhu,et al.  Attack-resilient time synchronization for wireless sensor networks , 2007, Ad Hoc Networks.

[37]  Richard Han,et al.  TSync: a lightweight bidirectional time synchronization service for wireless sensor networks , 2004, MOCO.

[38]  EstrinDeborah,et al.  Fine-grained network time synchronization using reference broadcasts , 2002 .

[39]  Guohong Cao,et al.  Optimizing tree reconfiguration for mobile target tracking in sensor networks , 2004, IEEE INFOCOM 2004.

[40]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[41]  Ajay D. Kshemkalyani,et al.  Clock synchronization for wireless sensor networks: a survey , 2005, Ad Hoc Networks.

[42]  Michael J. Rycroft,et al.  Understanding GPS. Principles and Applications , 1997 .