Abstract
In this chapter, we review time synchronization attacks in wireless sensor networks. We will first consider three of the main time synchronization protocols in sensor network in sections. In section we discuss applications of time synchronization in sensor networks. In section we analyze possible security attacks on the existing time synchronization protocols. In section we examine how different sensor network applications are affected by time synchronization attacks. Finally in section we propose possible countermeasures to secure the time synchronization protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Balogh, G., Ledeczi, A., Maroti, M., Simon, G. Time of Arrival Data Fusion for Source Localization.
Coleri, S. PEDAMACS: Power Efficient and Delay Aware Medium Access Protocol for Sensor Networks. M.S. Thesis, UC. Berkeley, December 2002.
Elson, J., Estrin, D. Fine-Grained Network Time Synchronization using Reference Broadcast. The fifth symposium on Operating Systems Design and Implementation (OSDI), p. 147–163, December 2002.
Fischler, M. A., Bolles, R. C. Random Sample Consensus: A Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography. Comm. of the ACM, Vol 24, pp 381–395, 1981.
Ganeriwawal, S., Kumar, R., Srivastava, M. Timing-Sync Protocol for Sensor Networks. The first ACM Conference on Embedded Networked Sensor Systems (SenSys), p. 138–149, November 2003.
Hohlt, B., Doherty, L., Brewer, E. Flexible Power Scheduling for Sensor Networks. Information Processing in Sensor Networks (IPSN), April 2004, Berkeley, CA.
Karlof, C, Sastry, N., Wagner, D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys), pages 162–175, November 2004.
Ledeczi A., Volgyesi P., Martoi M., et al. Multiple Simultaneous Acoustic Source Localization in Urban Terrain.
Maroti, M., Kusy, B., Simon, G., Ledeczi, A. The Flooding Synchronization Protocol. Proc. Of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys), November 2004.
Oh, S., Russell, S., Sastry, S. Markov Chain Monte Carlo Data Association for General Multiple-Target Tracking Problems.
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J. D. SPINS: Security Protocols for Sensor Networks. Mobile Computing and Networking. Rome, Italy, 2001.
Simon, G., Maroti, M., Ledeczi, A.. Sensor Network-Based Countersniper System. Proc. Of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys), November 2004.
Welch, G., Bishop, G. An Introduction to the Kalman Filter. University of North Carolina at Chapel Hill, Department of Computer Science, Chapel Hill, NC, USA. TR95-041. Available online at: http://www.cs.unc.edu/welch/publications.html
Available on the web: www.xbow.com/Products/productsdetails.aspx?sid=62
Available on the web: http://www.cs.unc.edu/ tracker/media/pdf/ SIG-GRAPH2001-CoursePack-08.pdf
Available on the web: www.wabash.edu/econexcel/LMSOrigin/LMSIntro.doc
Rmer, Kay. Time Synchronization in Ad Hoc Networks. Proceedings of MobiHoc 2001, ACM, October 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this paper
Cite this paper
Roosta, T., Manzo, M., Sastry, S. (2007). Time Synchronization Attacks in Sensor Networks. In: Poovendran, R., Roy, S., Wang, C. (eds) Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security, vol 30. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-46276-9_14
Download citation
DOI: https://doi.org/10.1007/978-0-387-46276-9_14
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-32721-1
Online ISBN: 978-0-387-46276-9
eBook Packages: Computer ScienceComputer Science (R0)