A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks

  • Jing XuEmail author
  • Yuqiang Zhang
  • Fei Xu
  • Lei Zhou
  • Shuanglin Jiang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11125)


The wireless sensor network is a typical distributed system where a standard reference time is prerequisite for all nodes to cooperate with each other. This paper proposes a security cycle clock synchronization method based on mobile reference nodes. First, a periodic synchronization model is established, where nodes are directly synchronized through the periodic movement of mobile reference nodes. Second, we proposed a key management method based on random number authentication to defense various attacks in the network. Through experimental analysis, we can see that this security strategy improves the network security and improves the synchronization accuracy of the whole network.


Security clock synchronization Mobile reference nodes Wireless sensor networks 


  1. 1.
    Lamonaca, F., Gasparri, A., Garone, E., Grimaldi, D.: Clock synchronization in wireless sensor network with selective convergence rate for event driven measurement applications. IEEE Trans. Instrum. Meas. 63(9), 2279–2287 (2014)CrossRefGoogle Scholar
  2. 2.
    Moreira, P., Alvarez, P., Serrano, J., Darwazeh, I.: Sub-nanosecond digital phase shifter for clock synchronization applications. In: 2012 IEEE International Conference on Frequency Control Symposium (FCS), pp. 1–6 (2012)Google Scholar
  3. 3.
    Bizagwira, H., Toussaint, J., Misson, M.: Synchronization protocol for dynamic environment: design and prototype experiments. In: IEEE 23rd International Conference on Telecommunications (ICT), pp. 1–7 (2016)Google Scholar
  4. 4.
    Lenzen, C., Sommer, P., Wattenhofer, R.: PulseSync: an efficient and scalable clock synchronization protocol. IEEE/ACM Trans. Netw. 23(3), 717–727 (2015)CrossRefGoogle Scholar
  5. 5.
    Nayyar, E.R.K.A.: Analytical study of time synchronization protocols for wireless sensor networks. Int. J. Comput. Trends Technol. 4(3), 323–332 (2013)Google Scholar
  6. 6.
    Rahamatkar, S., Agarwal, A., Kumar, N.: Analysis and comparative study of clock synchronization schemes in wireless sensor networks. Int. J. Comput. Sci. Eng. 2(3), 536–541 (2010)Google Scholar
  7. 7.
    Wu, J.: A survey of energy-efficient task synchronization for real-time embedded systems. In: 2017 IEEE 23rd International Conference Embedded and Real-Time Computing Systems and Applications (RTCSA), pp. 1–6 (2017)Google Scholar
  8. 8.
    Kumar, S., Lee, S.R.: A voltage compensated approach for clock drift compensation in wireless sensor networks. Inf. Jpn. 17(11), 5891–5896 (2014)Google Scholar
  9. 9.
    Er-Peng, L.I., Wen, K.Z., Wang, Y.: Design of high precision digital clock based on crystal oscillator compensation. Mod. Electron. Tech. (2014)Google Scholar
  10. 10.
    Li, C.S., Zhang, H.: Research on wireless power and information synchronous transmission method based on magnetic resonance for fuzes. Acta Armamentarii 32(5), 537–542 (2011)Google Scholar
  11. 11.
    Wang, Q., Zhang, H., Chen, G.: Effect of the heterogeneous neuron and information transmission delay on stochastic resonance of neuronal networks. Chaos Interdiscip. J. Nonlinear Sci. 22(4), 043123 (2012)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Boukerche, et al.: A new solution for the time-space localization problem in wireless sensor network using UAV. In: The Third ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, pp. 153–160. ACM (2013)Google Scholar
  13. 13.
    Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004). Scholar
  14. 14.
    Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of the Internet of Things. Comput. Electr. Eng. 37(2), 147–159 (2011)CrossRefGoogle Scholar
  15. 15.
    Kanavalli, A., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Recovery based time synchronization for wireless networks. Int. J. Comput. Sci. Eng. 3(11), 3596 (2011)Google Scholar
  16. 16.
    Tao, L., Gan, H., Yi-Dong, G.: Key agreement with authenticated between trusted nodes based on self-issued certificate in WSN. In: 2014 IEEE International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–3 (2014)Google Scholar
  17. 17.
    Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., Mancini, L.V.: Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4), 2163–2176 (2013)CrossRefGoogle Scholar
  18. 18.
    Jinwala, D., Patel, D., Dasgupta, K.: FlexiSec: a configurable link layer security architecture for wireless sensor networks. arXiv preprint arXiv:1203–4697 (2012)
  19. 19.
    Dhanalakshmi, T.G., Bharathi, N., Monisha, M.: Safety concerns of Sybil attack in WSN. In: 2014 IEEE International Conference Science Engineering and Management Research (ICSEMR), pp. 1–4 (2014)Google Scholar
  20. 20.
    Sharma, V., Hussain, M.: Mitigating replay attack in wireless sensor network through assortment of packets. In: Satapathy, S.C., Prasad, V.K., Rani, B.P., Udgata, S.K., Raju, K.S. (eds.) Proceedings of the First International Conference on Computational Intelligence and Informatics. AISC, vol. 507, pp. 221–230. Springer, Singapore (2017). Scholar
  21. 21.
    Xu-Jun, W.U., Wang, W.: Research on new features of IPv6 unicast routing protocol and application. Comput. Technol. Dev. (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Jing Xu
    • 1
    Email author
  • Yuqiang Zhang
    • 2
  • Fei Xu
    • 3
  • Lei Zhou
    • 4
  • Shuanglin Jiang
    • 4
  1. 1.Department of AutomationTsinghua UniversityBeijingPeople’s Republic of China
  2. 2.Beijing Institute of Aerospace Control DevicesBeijingPeople’s Republic of China
  3. 3.Institute of Information EngineeringChinese Academy of SciencesBeijingPeople’s Republic of China
  4. 4.Shenzhen Andisec Technology Co. Ltd.BeijingPeople’s Republic of China

Personalised recommendations