Abstract
The wireless sensor network is a typical distributed system where a standard reference time is prerequisite for all nodes to cooperate with each other. This paper proposes a security cycle clock synchronization method based on mobile reference nodes. First, a periodic synchronization model is established, where nodes are directly synchronized through the periodic movement of mobile reference nodes. Second, we proposed a key management method based on random number authentication to defense various attacks in the network. Through experimental analysis, we can see that this security strategy improves the network security and improves the synchronization accuracy of the whole network.
Supported by the project of the National Natural Science Foundation of China under Grant U1736116.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lamonaca, F., Gasparri, A., Garone, E., Grimaldi, D.: Clock synchronization in wireless sensor network with selective convergence rate for event driven measurement applications. IEEE Trans. Instrum. Meas. 63(9), 2279–2287 (2014)
Moreira, P., Alvarez, P., Serrano, J., Darwazeh, I.: Sub-nanosecond digital phase shifter for clock synchronization applications. In: 2012 IEEE International Conference on Frequency Control Symposium (FCS), pp. 1–6 (2012)
Bizagwira, H., Toussaint, J., Misson, M.: Synchronization protocol for dynamic environment: design and prototype experiments. In: IEEE 23rd International Conference on Telecommunications (ICT), pp. 1–7 (2016)
Lenzen, C., Sommer, P., Wattenhofer, R.: PulseSync: an efficient and scalable clock synchronization protocol. IEEE/ACM Trans. Netw. 23(3), 717–727 (2015)
Nayyar, E.R.K.A.: Analytical study of time synchronization protocols for wireless sensor networks. Int. J. Comput. Trends Technol. 4(3), 323–332 (2013)
Rahamatkar, S., Agarwal, A., Kumar, N.: Analysis and comparative study of clock synchronization schemes in wireless sensor networks. Int. J. Comput. Sci. Eng. 2(3), 536–541 (2010)
Wu, J.: A survey of energy-efficient task synchronization for real-time embedded systems. In: 2017 IEEE 23rd International Conference Embedded and Real-Time Computing Systems and Applications (RTCSA), pp. 1–6 (2017)
Kumar, S., Lee, S.R.: A voltage compensated approach for clock drift compensation in wireless sensor networks. Inf. Jpn. 17(11), 5891–5896 (2014)
Er-Peng, L.I., Wen, K.Z., Wang, Y.: Design of high precision digital clock based on crystal oscillator compensation. Mod. Electron. Tech. (2014)
Li, C.S., Zhang, H.: Research on wireless power and information synchronous transmission method based on magnetic resonance for fuzes. Acta Armamentarii 32(5), 537–542 (2011)
Wang, Q., Zhang, H., Chen, G.: Effect of the heterogeneous neuron and information transmission delay on stochastic resonance of neuronal networks. Chaos Interdiscip. J. Nonlinear Sci. 22(4), 043123 (2012)
Boukerche, et al.: A new solution for the time-space localization problem in wireless sensor network using UAV. In: The Third ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, pp. 153–160. ACM (2013)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_9
Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of the Internet of Things. Comput. Electr. Eng. 37(2), 147–159 (2011)
Kanavalli, A., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Recovery based time synchronization for wireless networks. Int. J. Comput. Sci. Eng. 3(11), 3596 (2011)
Tao, L., Gan, H., Yi-Dong, G.: Key agreement with authenticated between trusted nodes based on self-issued certificate in WSN. In: 2014 IEEE International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–3 (2014)
Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., Mancini, L.V.: Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4), 2163–2176 (2013)
Jinwala, D., Patel, D., Dasgupta, K.: FlexiSec: a configurable link layer security architecture for wireless sensor networks. arXiv preprint arXiv:1203–4697 (2012)
Dhanalakshmi, T.G., Bharathi, N., Monisha, M.: Safety concerns of Sybil attack in WSN. In: 2014 IEEE International Conference Science Engineering and Management Research (ICSEMR), pp. 1–4 (2014)
Sharma, V., Hussain, M.: Mitigating replay attack in wireless sensor network through assortment of packets. In: Satapathy, S.C., Prasad, V.K., Rani, B.P., Udgata, S.K., Raju, K.S. (eds.) Proceedings of the First International Conference on Computational Intelligence and Informatics. AISC, vol. 507, pp. 221–230. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-2471-9_22
Xu-Jun, W.U., Wang, W.: Research on new features of IPv6 unicast routing protocol and application. Comput. Technol. Dev. (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, J., Zhang, Y., Xu, F., Zhou, L., Jiang, S. (2018). A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks. In: Su, C., Kikuchi, H. (eds) Information Security Practice and Experience. ISPEC 2018. Lecture Notes in Computer Science(), vol 11125. Springer, Cham. https://doi.org/10.1007/978-3-319-99807-7_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-99807-7_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99806-0
Online ISBN: 978-3-319-99807-7
eBook Packages: Computer ScienceComputer Science (R0)