Cargando…
Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks
Time synchronization is critical for wireless sensors networks in industrial automation, e.g., event detection and process control of industrial plants and equipment need a common time reference. However, cyber-physical attacks are enormous threats causing synchronization protocols to fail. This pap...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6111940/ https://www.ncbi.nlm.nih.gov/pubmed/30126196 http://dx.doi.org/10.3390/s18082718 |
_version_ | 1783350761876357120 |
---|---|
author | Wang, Zhaowei Zeng, Peng Kong, Linghe Li, Dong Jin, Xi |
author_facet | Wang, Zhaowei Zeng, Peng Kong, Linghe Li, Dong Jin, Xi |
author_sort | Wang, Zhaowei |
collection | PubMed |
description | Time synchronization is critical for wireless sensors networks in industrial automation, e.g., event detection and process control of industrial plants and equipment need a common time reference. However, cyber-physical attacks are enormous threats causing synchronization protocols to fail. This paper studies the algorithm design and analysis in secure time synchronization for resource-constrained industrial wireless sensor networks under Sybil attacks, which cannot be well addressed by existing methods. A node-identification-based secure time synchronization (NiSTS) protocol is proposed. The main idea of this protocol is to utilize the timestamp correlation among different nodes and the uniqueness of a node’s clock skew to detect invalid information rather than isolating suspicious nodes. In the detection process, each node takes the relative skew with respect to its public neighbor as the basis to determine whether the information is reliable and to filter invalid information. The information filtering mechanism renders NiSTS resistant to Sybil attacks and message manipulation attacks. As a completely distributed protocol, NiSTS is not sensitive to the number of Sybil attackers. Extensive simulations were conducted to demonstrate the efficiency of NiSTS and compare it with existing protocols. |
format | Online Article Text |
id | pubmed-6111940 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-61119402018-08-30 Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks Wang, Zhaowei Zeng, Peng Kong, Linghe Li, Dong Jin, Xi Sensors (Basel) Article Time synchronization is critical for wireless sensors networks in industrial automation, e.g., event detection and process control of industrial plants and equipment need a common time reference. However, cyber-physical attacks are enormous threats causing synchronization protocols to fail. This paper studies the algorithm design and analysis in secure time synchronization for resource-constrained industrial wireless sensor networks under Sybil attacks, which cannot be well addressed by existing methods. A node-identification-based secure time synchronization (NiSTS) protocol is proposed. The main idea of this protocol is to utilize the timestamp correlation among different nodes and the uniqueness of a node’s clock skew to detect invalid information rather than isolating suspicious nodes. In the detection process, each node takes the relative skew with respect to its public neighbor as the basis to determine whether the information is reliable and to filter invalid information. The information filtering mechanism renders NiSTS resistant to Sybil attacks and message manipulation attacks. As a completely distributed protocol, NiSTS is not sensitive to the number of Sybil attackers. Extensive simulations were conducted to demonstrate the efficiency of NiSTS and compare it with existing protocols. MDPI 2018-08-18 /pmc/articles/PMC6111940/ /pubmed/30126196 http://dx.doi.org/10.3390/s18082718 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Wang, Zhaowei Zeng, Peng Kong, Linghe Li, Dong Jin, Xi Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks |
title | Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks |
title_full | Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks |
title_fullStr | Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks |
title_full_unstemmed | Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks |
title_short | Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks |
title_sort | node-identification-based secure time synchronization in industrial wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6111940/ https://www.ncbi.nlm.nih.gov/pubmed/30126196 http://dx.doi.org/10.3390/s18082718 |
work_keys_str_mv | AT wangzhaowei nodeidentificationbasedsecuretimesynchronizationinindustrialwirelesssensornetworks AT zengpeng nodeidentificationbasedsecuretimesynchronizationinindustrialwirelesssensornetworks AT konglinghe nodeidentificationbasedsecuretimesynchronizationinindustrialwirelesssensornetworks AT lidong nodeidentificationbasedsecuretimesynchronizationinindustrialwirelesssensornetworks AT jinxi nodeidentificationbasedsecuretimesynchronizationinindustrialwirelesssensornetworks |