Advertisement

An Approach towards Time Synchronization Based Secure Protocol for Wireless Sensor Network

  • Arun Kumar Tripathi
  • Ajay Agarwal
Part of the Communications in Computer and Information Science book series (CCIS, volume 88)

Abstract

Wireless sensor networks (WSN) have received a lot of attention recently due to their wide applications such as target tracking, environment monitoring, and scientific exploration in dangerous environments. Time synchronization is an important component of sensor networks to provide a common clock time in sensor nodes. Time synchronization protocols provide a mechanism for synchronizing the local clocks of the nodes in a sensor network. Some of the sensor nodes may be malicious, which can disrupt the normal operation of a sensor network. In this paper, we find out malicious nodes and propose time synchronization based secure protocol for a group of non-malicious nodes.

Keywords

Sensor Networks Security Time Synchronization Malicious nodes 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mukherjee, B., Ghosal, D., Yick, J.: Wireless sensor network survey. Computer Network 52(12), 2292–2330 (2008)CrossRefGoogle Scholar
  2. 2.
    Kshemkalyani, A.D., Sundararaman, B., Buy, U.: Clock synchronization for wireless sensor networks. A Survey on Ad-hoc Networks, 281–323 (2005)Google Scholar
  3. 3.
    Capkunl, S., Ganeriwal, S., Han, S., Srivastava, M.: Securing Timing Synchronization in Sensor Networks. In: Proceedings of, pp. 369–390. Springer, New York (2006)Google Scholar
  4. 4.
    Li, H., Chen, K., Wen, M., Zheng, Y.: A Secure Time Synchronization Protocol for Sensor Network. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol. 4819, pp. 515–526. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Wang, C., Ning, P., Sun, K.: Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2), 395–408 (2006)CrossRefGoogle Scholar
  6. 6.
    Song, H., Zhu, G.C.S.: Attack-resilient time synchronization for wireless sensor networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, p. 772 (2005)Google Scholar
  7. 7.
    Estrin, D., Elson, J., Girod, L.: Fine-grained network time synchronization using reference broadcasts. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation Special Issue, Boston, pp. 147–163 (2002)Google Scholar
  8. 8.
    Srivastava, M.B., Kumar, R., Ganeriwal, S.: Timing-sync protocol for sensor Networks. In: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems, Los Angeles, CA, pp. 138–149 (2003)Google Scholar
  9. 9.
    Ganeriwal, S., Popper, C., Capkun, S., Srivastava, M.B.: Secure Time Synchronization in Sensor Networks. ACM Transactions on Information and System Security, Article No: 23, 11(4) (2008)Google Scholar
  10. 10.
    Simon, G., Kusy, B., Ledeczi Maroti, M.: A Clock synchronization for wireless sensor networks: A Survey. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 30–49 (2004)Google Scholar
  11. 11.
    Trappe, W., Xu., W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana Champaign, IL, USA, pp. 46–57 (2005)Google Scholar
  12. 12.
    Hu, H., Atakli, I.M., Chen, Y., Ku, W.-S., Su, Z.: Malicious Node Detection in Wireless Sensor Networks. In: The Symposium on Simulation of Systems Security, pp. 836–843 (2008)Google Scholar
  13. 13.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 41–47 (2002)Google Scholar
  14. 14.
    Chan, H., Perrig, A., Song, D.: Random key predistribution scheme for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197 (2003)Google Scholar
  15. 15.
    Kopetz, H., Ochsenreiter, W.: Clock Synchronization in Distributed Real-Time Systems. IEEE Transactions on Computers 36(8), 933–940 (1987)zbMATHCrossRefGoogle Scholar
  16. 16.
    Hwang, J., Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, USA, pp. 43–52 (2004)Google Scholar
  17. 17.
    Jajodia, S., Setia, S., Zhu, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington DC., USA, pp. 62–72 (2003)Google Scholar
  18. 18.
    Cayirci, E., Akyildiz, I.F., Su, W., Sankarasubramaniam, Y.: A Survey on Sensor Networks. IEEE Communications Magazine, 102–114 (2002)Google Scholar
  19. 19.
    Manzo, M., Roosta, T., Sastry, S.: Time synchronization attacks in sensor networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 107–116 (2005)Google Scholar
  20. 20.
    Ping, S.: Delay Measurement Time Synchronization for Wireless Sensor Networks, Intel Corporation, Intel Research, Berkeley (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Arun Kumar Tripathi
    • 1
  • Ajay Agarwal
    • 1
  1. 1.Department of Computer ApplicationKrishna Institute of Engineering and TechnologyGhaziabad

Personalised recommendations