A Cluster-Based Secure Synchronization Protocol for Underwater Wireless Sensor Networks

被引:11
作者
Xu, Ming [1 ,2 ]
Liu, Guangzhong [1 ]
Zhu, Daqi [1 ]
Wu, Huafeng [3 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
[2] Fudan Univ, Shanghai Key Lab Intelligent Informat Proc, Shanghai 200433, Peoples R China
[3] Shanghai Maritime Univ, Merchant Marine Coll, Shanghai 201306, Peoples R China
关键词
RELATIVE NEIGHBORHOOD GRAPH;
D O I
10.1155/2014/398610
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure time synchronization is one of the key concerns for Underwater Wireless Sensor Networks (UWSNs). This paper presents a CLUster-based Secure Synchronization (CLUSS) protocol that ensures the security of synchronization under harsh underwater environments against various attacks, including Sybil attack, replay attack, message manipulation attack, and delay attack. The time synchronization process of CLUSS is divided into three phases: authentication phase, intercluster synchronization phase, and intracluster synchronization phase. During the authentication phase, cluster heads are authenticated to beacons and ordinary nodes are authenticated to cluster heads. During the process of intercluster and intracluster synchronization phases, CLUSS distinguishes the propagation delay of downlink from that of uplink caused by node movement in order to improve time synchronization accuracy. Moreover, part of these two phases can be executed concurrently for reducing the number of messages generated in synchronization. We demonstrate through simulations that CLUSS can reduce synchronization errors as well as energy consumption compared to traditional protocols in various circumstances.
引用
收藏
页数:13
相关论文
共 27 条
[1]  
Akyildiz I. F., 2005, Ad Hoc Networks, V3, P257, DOI 10.1016/j.adhoc.2005.01.004
[2]  
[Anonymous], 2012, J CONVERG INF TECHNO
[3]  
[Anonymous], 2006, Proc. of IEEE INFOCOM, DOI [10.1109/INFOCOM.2006. 161, DOI 10.1109/INFOCOM.2006.161]
[4]  
[Anonymous], 2004, Proceedings of International Conference on Embedded Networked Sensor Systems (Sensys), DOI [10.1145/1031495.1031501, DOI 10.1145/1031495.1031501]
[5]  
[Anonymous], 2009, OCEANS 2009
[6]  
[Anonymous], 2003, Proceedings of the 1st International Conference on Embedded Networks Sensor Systems (SenSys'03), DOI DOI 10.1145/958491.958508
[7]  
[Anonymous], INT J ADV SECURITY
[8]  
[Anonymous], 2008, P 3 ACM INT WORKSHOP
[9]  
[Anonymous], J CONVERGENCE INFORM
[10]  
[Anonymous], 2011, INT J COMPUT ELECT E