Secured flooding time synchronization protocol with moderator

被引:20
作者
Huang, Ding-Jie [1 ]
Teng, Wei-Chung [1 ]
Yang, Kai-Ting [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
关键词
FTSP; clock skew; WSN; traitor attack; replication attack; WIRELESS SENSOR NETWORKS; SCHEME; SYSTEM;
D O I
10.1002/dac.2614
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This work aims to address the security vulnerability of the Flooding Time Synchronization Protocol (FTSP), which is currently one of the most popular approaches for time synchronization in wireless sensor networks. FTSP has advanced features, such as implicitly dynamic topology and high time accuracy, but still has unresolved security issues. In order to defend against attacks from malicious nodes, we propose several technologies to reinforce the structure of FTSP. First, a reference node selecting mechanism is proposed to reduce the effect of multiple reference nodes, and four filters are proposed to defend against seqNum attack, global time attack and node replication attack. Experiment results show that the proposed sequence number blacklist filter and the global time blacklist filter are effective in defending against the aforementioned attacks. Second, a new root selection mechanism is proposed to secure the process of updating the root node. Combining the root selection mechanism with the global time black list filter, the proposed mechanisms successfully defend against traitor attacks on FTSP in our experiment. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1092 / 1115
页数:24
相关论文
共 50 条
[21]   Security in wireless sensor networks [J].
Giruka, Venkata C. ;
Singhal, Mukesh ;
Royalty, James ;
Varanasi, Srilekha .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01) :1-24
[22]   Collection Tree Protocol [J].
Gnawali, Omprakash ;
Fonseca, Rodrigo ;
Jamieson, Kyle ;
Moss, David ;
Levis, Philip .
SENSYS 09: PROCEEDINGS OF THE 7TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, 2009, :1-14
[23]   WHOMoVeS: An optimized broadband sensor network for military vehicle tracking [J].
Hamdi, Mohamed ;
Boudriga, Noureddine ;
Obaidat, Mohammad S. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2008, 21 (03) :277-300
[24]  
Hohlt B, 2004, IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P205
[25]  
Hu X, 2008, IEEE INFOCOM SER, P448
[26]   NetEye: a user-centered wireless sensor network testbed for high-fidelity, robust experimentation [J].
Ju, Xi ;
Zhang, Hongwei ;
Sakamuri, Divya .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (09) :1213-1229
[27]   Octopus: monitoring, visualization, and control of sensor networks [J].
Jurdak, Raja ;
Ruzzelli, Antonio G. ;
Barbirato, Alessio ;
Boivineau, Samuel .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (08) :1073-1091
[28]   Performance study of wireless sensor and actuator networks in forest fire scenarios [J].
Kulakowski, Pawel ;
Calle, Eusebi ;
Marzo, Jose L. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (04) :515-529
[29]   TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks [J].
Liu, An ;
Ning, Peng .
2008 INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS, 2008, :245-256
[30]  
Manzo Michael., 2005, SASN 05, P107, DOI DOI 10.1145/1102219.1102238