Secured flooding time synchronization protocol with moderator

SUMMARY This work aims to address the security vulnerability of the Flooding Time Synchronization Protocol (FTSP), which is currently one of the most popular approaches for time synchronization in wireless sensor networks. FTSP has advanced features, such as implicitly dynamic topology and high time accuracy, but still has unresolved security issues. In order to defend against attacks from malicious nodes, we propose several technologies to reinforce the structure of FTSP. First, a reference node selecting mechanism is proposed to reduce the effect of multiple reference nodes, and four filters are proposed to defend against seqNum attack, global time attack and node replication attack. Experiment results show that the proposed sequence number blacklist filter and the global time blacklist filter are effective in defending against the aforementioned attacks. Second, a new root selection mechanism is proposed to secure the process of updating the root node. Combining the root selection mechanism with the global time black list filter, the proposed mechanisms successfully defend against traitor attacks on FTSP in our experiment. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Philip Levis,et al.  Collection tree protocol , 2009, SenSys '09.

[3]  J. Antonio García-Macías,et al.  Deploying a voice capture sensor network system for a secure ubiquitous home environment , 2009 .

[4]  Mohammad S. Obaidat,et al.  WHOMoVeS: An optimized broadband sensor network for military vehicle tracking , 2008, Int. J. Commun. Syst..

[5]  Jian Wan,et al.  PMSW: a passive monitoring system in wireless sensor networks , 2011, Int. J. Netw. Manag..

[6]  Roger Wattenhofer,et al.  Gradient clock synchronization in wireless sensor networks , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[7]  Naixue Xiong,et al.  An energy-efficient scheme in next-generation sensor networks , 2010 .

[8]  Peng Ning,et al.  Secure and resilient clock synchronization in wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[10]  Azzedine Boukerche,et al.  Secure time synchronization protocols for wireless sensor networks , 2007, IEEE Wireless Communications.

[11]  Sencun Zhu,et al.  Attack-resilient time synchronization for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[12]  B. Hohlt,et al.  Flexible power scheduling for sensor networks , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[13]  Srdjan Capkun,et al.  Secure time synchronization service for sensor networks , 2005, WiSe '05.

[14]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[15]  Jocelyn Adams Securing Flooding Time Synchronization Protocol in Sensor Networks , 2006 .

[16]  Joseph M. Hellerstein,et al.  Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[17]  S. Shankar Sastry,et al.  Testbed Implementation of a Secure Flooding Time Synchronization Protocol , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[18]  Peng Ning,et al.  TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.

[19]  Raja Jurdak,et al.  Octopus: monitoring, visualization, and control of sensor networks , 2011, Wirel. Commun. Mob. Comput..

[20]  Kang G. Shin,et al.  Attack-Tolerant Time-Synchronization in Wireless Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[21]  Philip Levis,et al.  The nesC language: a holistic approach to networked embedded systems , 2003, SIGP.

[22]  Ian F. Akyildiz,et al.  Time-diffusion synchronization protocol for wireless sensor networks , 2005, IEEE/ACM Transactions on Networking.

[23]  Hongwei Zhang,et al.  NetEye: a user-centered wireless sensor network testbed for high-fidelity, robust experimentation , 2012, Int. J. Commun. Syst..

[24]  Fu Fei,et al.  ASTS: An Agile Secure Time Synchronization Protocol for Wireless Sensor Networks , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[25]  Abbas Jamalipour,et al.  Accuracy, latency, and energy cross-optimization in wireless sensor networks through infection spreading , 2011, Int. J. Commun. Syst..

[26]  Saurabh Ganeriwal,et al.  Timing-sync protocol for sensor networks , 2003, SenSys '03.

[27]  S. Shankar Sastry,et al.  Time synchronization attacks in sensor networks , 2005, SASN '05.

[28]  J. Elson,et al.  Fine-grained network time synchronization using reference broadcasts , 2002, OSDI '02.

[29]  Ajay D. Kshemkalyani,et al.  Clock synchronization for wireless sensor networks: a survey , 2005, Ad Hoc Networks.

[30]  Srdjan Capkun,et al.  Extended Abstract: SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks , 2007 .

[31]  Srdjan Capkun,et al.  Secure Time Synchronization in Sensor Networks , 2008, TSEC.

[32]  Nadjib Badache,et al.  Secure pairwise broadcast time synchronization in wireless sensor networks , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[33]  Xin-Ping Guan,et al.  TREE: Routing strategy with guarantee of QoS for industrial wireless sensor networks , 2014, Int. J. Commun. Syst..

[34]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[35]  Gyula Simon,et al.  The flooding time synchronization protocol , 2004, SenSys '04.

[36]  Claude Castelluccia,et al.  Toward clock skew based wireless sensor node services , 2010, 2010 The 5th Annual ICST Wireless Internet Conference (WICON).

[37]  Jan M. Rabaey,et al.  Lightweight time synchronization for sensor networks , 2003, WSNA '03.

[38]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[39]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[40]  Joel J. P. C. Rodrigues,et al.  A survey on IP‐based wireless sensor network solutions , 2010, Int. J. Commun. Syst..

[41]  Erchin Serpedin,et al.  A New Approach for Time Synchronization in Wireless Sensor Networks: Pairwise Broadcast Synchronization , 2008, IEEE Transactions on Wireless Communications.

[42]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[43]  Songhwai Oh,et al.  Markov chain Monte Carlo data association for general multiple-target tracking problems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[44]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[45]  Hyunseung Choo,et al.  SCCS: Spatiotemporal clustering and compressing schemes for efficient data collection applications in WSNs , 2010, Int. J. Commun. Syst..

[46]  Khalil El-Khatib,et al.  Secure Time Synchronization for Wireless Sensor Networks Based on Bilinear Pairing Functions , 2010, IEEE Transactions on Parallel and Distributed Systems.

[47]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[48]  Mohsen Guizani,et al.  Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.

[49]  Nicolae Tapus,et al.  Fault-Tolerant Flooding Time Synchronization Protocol for Wireless Sensor Networks , 2010, 2010 Sixth International Conference on Networking and Services.

[50]  Pawel Kulakowski,et al.  Performance study of wireless sensor and actuator networks in forest fire scenarios , 2013, Int. J. Commun. Syst..

[51]  Peng Liu,et al.  Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.