Cargando…

Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks

Time synchronization is critical for wireless sensors networks in industrial automation, e.g., event detection and process control of industrial plants and equipment need a common time reference. However, cyber-physical attacks are enormous threats causing synchronization protocols to fail. This pap...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Zhaowei, Zeng, Peng, Kong, Linghe, Li, Dong, Jin, Xi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6111940/
https://www.ncbi.nlm.nih.gov/pubmed/30126196
http://dx.doi.org/10.3390/s18082718
_version_ 1783350761876357120
author Wang, Zhaowei
Zeng, Peng
Kong, Linghe
Li, Dong
Jin, Xi
author_facet Wang, Zhaowei
Zeng, Peng
Kong, Linghe
Li, Dong
Jin, Xi
author_sort Wang, Zhaowei
collection PubMed
description Time synchronization is critical for wireless sensors networks in industrial automation, e.g., event detection and process control of industrial plants and equipment need a common time reference. However, cyber-physical attacks are enormous threats causing synchronization protocols to fail. This paper studies the algorithm design and analysis in secure time synchronization for resource-constrained industrial wireless sensor networks under Sybil attacks, which cannot be well addressed by existing methods. A node-identification-based secure time synchronization (NiSTS) protocol is proposed. The main idea of this protocol is to utilize the timestamp correlation among different nodes and the uniqueness of a node’s clock skew to detect invalid information rather than isolating suspicious nodes. In the detection process, each node takes the relative skew with respect to its public neighbor as the basis to determine whether the information is reliable and to filter invalid information. The information filtering mechanism renders NiSTS resistant to Sybil attacks and message manipulation attacks. As a completely distributed protocol, NiSTS is not sensitive to the number of Sybil attackers. Extensive simulations were conducted to demonstrate the efficiency of NiSTS and compare it with existing protocols.
format Online
Article
Text
id pubmed-6111940
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-61119402018-08-30 Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks Wang, Zhaowei Zeng, Peng Kong, Linghe Li, Dong Jin, Xi Sensors (Basel) Article Time synchronization is critical for wireless sensors networks in industrial automation, e.g., event detection and process control of industrial plants and equipment need a common time reference. However, cyber-physical attacks are enormous threats causing synchronization protocols to fail. This paper studies the algorithm design and analysis in secure time synchronization for resource-constrained industrial wireless sensor networks under Sybil attacks, which cannot be well addressed by existing methods. A node-identification-based secure time synchronization (NiSTS) protocol is proposed. The main idea of this protocol is to utilize the timestamp correlation among different nodes and the uniqueness of a node’s clock skew to detect invalid information rather than isolating suspicious nodes. In the detection process, each node takes the relative skew with respect to its public neighbor as the basis to determine whether the information is reliable and to filter invalid information. The information filtering mechanism renders NiSTS resistant to Sybil attacks and message manipulation attacks. As a completely distributed protocol, NiSTS is not sensitive to the number of Sybil attackers. Extensive simulations were conducted to demonstrate the efficiency of NiSTS and compare it with existing protocols. MDPI 2018-08-18 /pmc/articles/PMC6111940/ /pubmed/30126196 http://dx.doi.org/10.3390/s18082718 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wang, Zhaowei
Zeng, Peng
Kong, Linghe
Li, Dong
Jin, Xi
Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks
title Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks
title_full Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks
title_fullStr Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks
title_full_unstemmed Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks
title_short Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks
title_sort node-identification-based secure time synchronization in industrial wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6111940/
https://www.ncbi.nlm.nih.gov/pubmed/30126196
http://dx.doi.org/10.3390/s18082718
work_keys_str_mv AT wangzhaowei nodeidentificationbasedsecuretimesynchronizationinindustrialwirelesssensornetworks
AT zengpeng nodeidentificationbasedsecuretimesynchronizationinindustrialwirelesssensornetworks
AT konglinghe nodeidentificationbasedsecuretimesynchronizationinindustrialwirelesssensornetworks
AT lidong nodeidentificationbasedsecuretimesynchronizationinindustrialwirelesssensornetworks
AT jinxi nodeidentificationbasedsecuretimesynchronizationinindustrialwirelesssensornetworks