Attack-resilient time synchronization for wireless sensor networks

作者: Hui Song , Sencun Zhu , Guohong Cao

DOI: 10.1016/J.ADHOC.2006.05.016

关键词:

摘要: Abstract The existing time synchronization schemes in sensor networks were not designed with security mind, thus leaving them vulnerable to attacks. In this paper, we first identify various attacks that are effective several representative schemes, and then focus on a specific type of attack called delay , which cannot be addressed by cryptographic techniques. Next propose two approaches detect accommodate the attack. Our approach uses generalized extreme studentized deviate (GESD) algorithm multiple outliers introduced compromised nodes; our second threshold derived using transformation technique filter out outliers. Finally show effectiveness these through extensive simulations.

参考文章(39)
Mike Chen, Weidong Cui, Victor Wen, Security and Deployment Issues in a Sensor Network ,(2000)
Hongli Xu, Liusheng Huang, Yingyu Wan, Ben Xu, Accurate Time Synchronization for Wireless Sensor Networks Lecture Notes in Computer Science. pp. 153- 163 ,(2005) , 10.1007/11599463_16
Wensheng Zhang, Guohong Cao, Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach international conference on computer communications. ,vol. 1, pp. 503- 514 ,(2005) , 10.1109/INFCOM.2005.1497918
Bernard Rosner, Percentage Points for a Generalized ESD Many-Outlier Procedure Technometrics. ,vol. 25, pp. 165- 172 ,(1983) , 10.1080/00401706.1983.10487848
Bharath Sundararaman, Ugo Buy, Ajay D. Kshemkalyani, Clock synchronization for wireless sensor networks: a survey ad hoc networks. ,vol. 3, pp. 281- 323 ,(2005) , 10.1016/J.ADHOC.2005.01.002
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, SPINS Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 189- 199 ,(2001) , 10.1145/381677.381696
Joseph Y. Halpern, Barbara Simons, Ray Strong, Danny Dolev, Fault-tolerant clock synchronization principles of distributed computing. pp. 89- 102 ,(1984) , 10.1145/800222.806739
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks computer and communications security. pp. 62- 72 ,(2003) , 10.1145/948109.948120
Douglas M. Hawkins, Identification of outliers ,(1980)