Skip to main content

A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks

  • Conference paper
  • First Online:
Book cover Information Security Practice and Experience (ISPEC 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11125))

  • 1184 Accesses

Abstract

The wireless sensor network is a typical distributed system where a standard reference time is prerequisite for all nodes to cooperate with each other. This paper proposes a security cycle clock synchronization method based on mobile reference nodes. First, a periodic synchronization model is established, where nodes are directly synchronized through the periodic movement of mobile reference nodes. Second, we proposed a key management method based on random number authentication to defense various attacks in the network. Through experimental analysis, we can see that this security strategy improves the network security and improves the synchronization accuracy of the whole network.

Supported by the project of the National Natural Science Foundation of China under Grant U1736116.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lamonaca, F., Gasparri, A., Garone, E., Grimaldi, D.: Clock synchronization in wireless sensor network with selective convergence rate for event driven measurement applications. IEEE Trans. Instrum. Meas. 63(9), 2279–2287 (2014)

    Article  Google Scholar 

  2. Moreira, P., Alvarez, P., Serrano, J., Darwazeh, I.: Sub-nanosecond digital phase shifter for clock synchronization applications. In: 2012 IEEE International Conference on Frequency Control Symposium (FCS), pp. 1–6 (2012)

    Google Scholar 

  3. Bizagwira, H., Toussaint, J., Misson, M.: Synchronization protocol for dynamic environment: design and prototype experiments. In: IEEE 23rd International Conference on Telecommunications (ICT), pp. 1–7 (2016)

    Google Scholar 

  4. Lenzen, C., Sommer, P., Wattenhofer, R.: PulseSync: an efficient and scalable clock synchronization protocol. IEEE/ACM Trans. Netw. 23(3), 717–727 (2015)

    Article  Google Scholar 

  5. Nayyar, E.R.K.A.: Analytical study of time synchronization protocols for wireless sensor networks. Int. J. Comput. Trends Technol. 4(3), 323–332 (2013)

    Google Scholar 

  6. Rahamatkar, S., Agarwal, A., Kumar, N.: Analysis and comparative study of clock synchronization schemes in wireless sensor networks. Int. J. Comput. Sci. Eng. 2(3), 536–541 (2010)

    Google Scholar 

  7. Wu, J.: A survey of energy-efficient task synchronization for real-time embedded systems. In: 2017 IEEE 23rd International Conference Embedded and Real-Time Computing Systems and Applications (RTCSA), pp. 1–6 (2017)

    Google Scholar 

  8. Kumar, S., Lee, S.R.: A voltage compensated approach for clock drift compensation in wireless sensor networks. Inf. Jpn. 17(11), 5891–5896 (2014)

    Google Scholar 

  9. Er-Peng, L.I., Wen, K.Z., Wang, Y.: Design of high precision digital clock based on crystal oscillator compensation. Mod. Electron. Tech. (2014)

    Google Scholar 

  10. Li, C.S., Zhang, H.: Research on wireless power and information synchronous transmission method based on magnetic resonance for fuzes. Acta Armamentarii 32(5), 537–542 (2011)

    Google Scholar 

  11. Wang, Q., Zhang, H., Chen, G.: Effect of the heterogeneous neuron and information transmission delay on stochastic resonance of neuronal networks. Chaos Interdiscip. J. Nonlinear Sci. 22(4), 043123 (2012)

    Article  MathSciNet  Google Scholar 

  12. Boukerche, et al.: A new solution for the time-space localization problem in wireless sensor network using UAV. In: The Third ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, pp. 153–160. ACM (2013)

    Google Scholar 

  13. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_9

    Chapter  MATH  Google Scholar 

  14. Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of the Internet of Things. Comput. Electr. Eng. 37(2), 147–159 (2011)

    Article  Google Scholar 

  15. Kanavalli, A., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Recovery based time synchronization for wireless networks. Int. J. Comput. Sci. Eng. 3(11), 3596 (2011)

    Google Scholar 

  16. Tao, L., Gan, H., Yi-Dong, G.: Key agreement with authenticated between trusted nodes based on self-issued certificate in WSN. In: 2014 IEEE International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–3 (2014)

    Google Scholar 

  17. Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., Mancini, L.V.: Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4), 2163–2176 (2013)

    Article  Google Scholar 

  18. Jinwala, D., Patel, D., Dasgupta, K.: FlexiSec: a configurable link layer security architecture for wireless sensor networks. arXiv preprint arXiv:1203–4697 (2012)

  19. Dhanalakshmi, T.G., Bharathi, N., Monisha, M.: Safety concerns of Sybil attack in WSN. In: 2014 IEEE International Conference Science Engineering and Management Research (ICSEMR), pp. 1–4 (2014)

    Google Scholar 

  20. Sharma, V., Hussain, M.: Mitigating replay attack in wireless sensor network through assortment of packets. In: Satapathy, S.C., Prasad, V.K., Rani, B.P., Udgata, S.K., Raju, K.S. (eds.) Proceedings of the First International Conference on Computational Intelligence and Informatics. AISC, vol. 507, pp. 221–230. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-2471-9_22

    Chapter  Google Scholar 

  21. Xu-Jun, W.U., Wang, W.: Research on new features of IPv6 unicast routing protocol and application. Comput. Technol. Dev. (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, J., Zhang, Y., Xu, F., Zhou, L., Jiang, S. (2018). A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks. In: Su, C., Kikuchi, H. (eds) Information Security Practice and Experience. ISPEC 2018. Lecture Notes in Computer Science(), vol 11125. Springer, Cham. https://doi.org/10.1007/978-3-319-99807-7_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99807-7_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99806-0

  • Online ISBN: 978-3-319-99807-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics