Securing Timing Synchronization in Sensor Networks

Time synchronization is critical in sensor networks at many layers of its design. It enables better duty-cycling of the radio, accurate and secure localization, beamforming and other collaborative signal processing. Examples of existing sensor network applications where precise time is needed include: measuring the time-of-flight of sound; distributing an acoustic beam forming array; forming a low-power TDMA radio schedule; integrating a time-series of proximity detections into a velocity estimate; suppressing redundant messages by recognizing duplicate detections of the same event by different sensors; ordered logging of events during system debugging; integrating multi sensor data; or coordinating on future action. Imagine the detrimental affect on the functionality of all these applications, if a malicious adversary is able to abuse the underlying time synchronization protocol. Nodes will have faulty estimates about the location of other nodes. Packets will be lost if the sleep-wakeup schedule of nodes do not intersect. This can further trigger unnecessary packet retransmissions if MAC layer acknowledgements are enabled. It will be trivial for adversaries to perform replay attacks. Collaborative data processing and signal processing techniques will be adversely affected.

[1]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.

[2]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[3]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[4]  I.A. Getting,et al.  Perspective/navigation-The Global Positioning System , 1993, IEEE Spectrum.

[5]  Dawn Xiaodong Song,et al.  Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..

[6]  J. Mcneff The global positioning system , 2002 .

[7]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[8]  Deborah Estrin,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Fine-grained Network Time Synchronization Using Reference Broadcasts , 2022 .

[9]  Saurabh Ganeriwal,et al.  Timing-sync protocol for sensor networks , 2003, SenSys '03.

[10]  Mihail L. Sichitiu,et al.  Simple, accurate time synchronization for wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[11]  Jens Palsberg,et al.  Avrora: scalable sensor network simulation with precise timing , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[12]  Gyula Simon,et al.  The flooding time synchronization protocol , 2004, SenSys '04.

[13]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[14]  Jan M. Rabaey,et al.  Lightweight time synchronization for sensor networks , 2003, WSNA '03.

[15]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[16]  Ajay D. Kshemkalyani,et al.  Clock synchronization for wireless sensor networks: a survey , 2005, Ad Hoc Networks.

[17]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[18]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.