Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 30))

Abstract

An accurate and synchronized clock time is crucial in many sensor network applications. A number of time synchronization schemes have been proposed for wireless sensor networks recently to address the resource constraints in such networks. However, most of these techniques assume benign environments, thus cannot survive malicious attacks in hostile environments, especially when there are compromised nodes. In this chapter, we present the clock model for time synchronization, and briefly introduce the insecure time synchronization techniques in wireless sensor networks. We then present the challenges and requirements to secure time synchronization and summarize the recent progress on secure time synchronization in wireless sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 229.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. GPS time transfer. http://tf.nist.gov/timefreq/time/gps.htm.

    Google Scholar 

  2. The network simulator — ns-2. http://www.isi.edu/nsnam/ns/.

    Google Scholar 

  3. IEEE standard 802.11. wireless 1an medium access control (MAC) and physical layer (PHY) specification, 1999.

    Google Scholar 

  4. B. Barak, S. Halevi, A. Herzberg, and D. Naor. Clock synchronization with faults and recoveries. In Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing, pages 133–142, 2000.

    Google Scholar 

  5. K. Chakrabarty, S. S. Iyengar, H. Qi, and E. Cho. Grid coverage for surveillance and target location in distributed sensor networks. IEEE Transactions on Computers, 51:1448–1453, 2002.

    Article  MathSciNet  Google Scholar 

  6. H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Research in Security and Privacy, pages 197–213, 2003.

    Google Scholar 

  7. F. Cristian. Probabilistic clock synchronization. Distributed Computing, 3(3):146–158, 1989.

    Article  MATH  Google Scholar 

  8. H. Dai and R. Han. Tsync: a lightweight bidirectional time synchronization service for wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review, 8(1):125–139, 2004.

    Article  Google Scholar 

  9. D. Dolev, J. Y. Halpern, B. Simons, and R. Strong. Dynamic fault-tolerant clock synchronization. Journal of the ACM, 42(1): 143–185, 1995.

    Article  MATH  Google Scholar 

  10. W. Du, J. Deng, Y. S. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), pages 42–51, October 2003.

    Google Scholar 

  11. J. Elson, L. Girod, and D. Estrin. Fine-grained network time synchronization using reference broadcasts. ACM SIGOPS Operating Systems Review, 36:147–163, 2002.

    Article  Google Scholar 

  12. J. Elson and K. Römer. Wireless sensor networks: A new regime for time synchronization. In Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I), pages 149–154, October 2002.

    Google Scholar 

  13. A. Galleni and D. Powell. Consensus and membership in synchronous and asynchronous distributed systems. Technical Report 96104, LAAS, April 1996.

    Google Scholar 

  14. S. Ganeriwal, S. Capkun, C. Han, and M. B. Srivastava. Secure time synchronization service for sensor networks. In Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005), pages 97–106, September 2005.

    Google Scholar 

  15. S. Ganeriwal, D. Ganesan, H. Shim, V. Tsiatsis, and M. B. Srivastava. Estimating clock uncertainty for efficient duty-cycling in sensor networks. In Proceedings of the 3rd international conference on Embedded networked sensor systems (SenSys), pages 130–141, 2005.

    Google Scholar 

  16. S. Ganeriwal, R. Kumar, and M. B. Srivastava. Timing-sync protocol for sensor networks. In Proceedings of the First International Conference on Embedded Networked Sensor Systems (SenSys), pages 138–149, 2003.

    Google Scholar 

  17. J. Greunen and J. Rabaey. Lightweight time synchronization for sensor networks. In Proceedings of the Second ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), pages 11–19, September 2003.

    Google Scholar 

  18. N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), August 2004.

    Google Scholar 

  19. R. Gusella and S. Zatti. The accuracy of the clock synchronization achieved by tempo in berkeley unix 4.3bsd. IEEE Transactions on Software Engineering, 15(7):847–853, 1989.

    Article  Google Scholar 

  20. J.Y. Halpern, B.B. Simons, H.R. Strong, and D. Dolev. Fault-tolerant clock synchronization. In Proceedings of Third Annual ACM Symposium on Principles of Distributed Computing, pages 89–102, 1984.

    Google Scholar 

  21. A. Hu and S. D. Servetto. Asymptotically optimal time synchronization in dense sensor networks. In Proceedings of the Second ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), pages 1–10, September 2003.

    Google Scholar 

  22. Y.C. Hu, A. Perrig, and D.B. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of INFOCOM 2003, April 2003.

    Google Scholar 

  23. C.M. Krishna, K.G. Shin, and R.W. Butler. Ensuring fault tolerance of phase-locked clocks. IEEE Transactions on Computers, 34(8):752–756, 1985.

    Article  MATH  Google Scholar 

  24. L. Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7):558–565, 1978.

    Article  MATH  Google Scholar 

  25. L. Lamport and P.M. Melliar-Smith. Synchronizing clocks in the presence of faults. Journal of the ACM, 32(1):52–78, 1985.

    Article  MATH  MathSciNet  Google Scholar 

  26. Q. Li and D. Rus. Global clock synchronization in sensor networks. In Proceedings of IEEE INFOCOM 2004, pages 214–226, March 2004.

    Google Scholar 

  27. D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), pages 52–61, October 2003.

    Google Scholar 

  28. D. Liu, P. Ning, and W.K. Du. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS’ 05), pages 609–619, June 2005.

    Google Scholar 

  29. J. Lundelius and N. Lynch. A new fault-tolerant algorithm for clock synchronization. In Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, pages 75–88, 1984.

    Google Scholar 

  30. J. Lundelius-Welch and N. Lynch. A new fault-tolerant algorithm for clock synchronization. Information and Computation, 77(1):1–36, 1988.

    Article  MathSciNet  Google Scholar 

  31. S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. TAG:a tiny aggregation service for ad-hoc sensor networks. In Proceedings of the 5th Annual Symposium on Operating Systems Design and Implementation (OSDI), December 2002.

    Google Scholar 

  32. M. Manzo, T. Roosta, and S. Sastry. Time synchronization attacks in sensor networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pages 107–116, 2005.

    Google Scholar 

  33. M. Maroti, B. Kusy, G. Simon, and A. Ledeczi. The flooding time synchronization protocol. In Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys’04), pages 39–49, Nov 2004.

    Google Scholar 

  34. L. Meier, P. Blum, and L. Thiele. Internal synchronization of drift-constraint clocks in adhoc sensor networks. In Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing MobiHoc’ 04, 2004.

    Google Scholar 

  35. D.L. Mills. Internet time synchronization: The network time protocol. IEEE Transactions on Communications, 39(10):1482–1493,1991.

    Article  Google Scholar 

  36. S. Mishra and A. Nasipuri. An adaptive low power reservation based mac protocol for wireless sensor. In Proceedings of the IEEE International Conference on Performance Computing and Communications, pages 713–736, 2004.

    Google Scholar 

  37. M. Mock, R. Frings, E. Nett, and S. Trikaliotis. Clock synchronization for wireless local area networks. In Proceedings of the 12th Euromicro Conference on Real-Time Systems (Euromicro-RTS 2000), June 2000.

    Google Scholar 

  38. J. Newsome, R. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: Analysis and defenses. In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004), April 2004.

    Google Scholar 

  39. A. Olson and K.G. Shin. Fault-tolerant clock synchronization in large multicomputer systems. IEEE Transactions on Parallel and Distributed Systems, 5(9):912–923, 1994.

    Article  Google Scholar 

  40. S. PalChaudhuri, A.K. Saha, and D.B. Johnson. Adaptive clock synchronization in sensor networks. In Information Processing in Sensor Networks (IPSN), pages 340–348, April 2004.

    Google Scholar 

  41. B. Parno, A. Perrig, and V. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy, May 2005.

    Google Scholar 

  42. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, pages 521–534, July 2001.

    Google Scholar 

  43. P. Ramanathan, D.D. Kandlur, and K.G. Shin. Hardware-assisted software clock synchronization for homogeneous distributed systems. IEEE Transactions on Computers, 39(4):514–524, 1990.

    Article  Google Scholar 

  44. P. Ramanathan, K.G. Shin, and R.W. Butler. Fault-tolerant clock synchronization in distributed systems. IEEE Computer, 23(10):33–42, 1990.

    Google Scholar 

  45. K. Römer. Time synchronization in ad hoc networks. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pages 173–182, 2001.

    Google Scholar 

  46. K. Römer, P. Blum, and L. Meier. Time synchronization and calibration in wireless sensor networks. In Ivan Stojmenovic, editor, Wireless Sensor Networks. John Wiley Sons, 2005. To appear.

    Google Scholar 

  47. F.B. Schneider. A paradigm for reliable clock synchronization. Technical Report TR 86-735, Cornell University, Department of Computer Science, 1986.

    Google Scholar 

  48. F.B. Schneider. Understanding protocols for Byzantine clock synchronization. Technical Report TR 87-859, Cornell University, Department of Computer Science, 1987.

    Google Scholar 

  49. K.G. Shin and P. Ramanathan. Clock synchronization of a large multiprocessor system in the presence of malicious faults. IEEE Transactions on Computers, 36(1):2–12, 1987.

    Article  Google Scholar 

  50. M.L. Sichitiu and C. Veerarittiphan. Simple, accurate time synchronization for wireless sensor networks. In IEEE Wireless Communications and Networking Conference WCNC03, 2003.

    Google Scholar 

  51. T. K. Srikanth and S. Toueg. Optimal clock synchronization. Journal of the ACM, 34(3):626–645, 1987.

    Article  MathSciNet  Google Scholar 

  52. W. Su and I. F. Akyildiz. Time-diffusion synchronization protocol for wireless sensor networks. IEEE/ACM Transactions on Networking (TON), 13(2), 2005.

    Google Scholar 

  53. K. Sun, P. Ning, and C. Wang. Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE Transactions on Dependable and Secure Computing (TDSC), 2(3):177–189, July-September 2005.

    Article  Google Scholar 

  54. K. Sun, P. Ning, and C. Wang. Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2), February 2006.

    Google Scholar 

  55. D. Tian and N. D. Georganas. A coverage-preserving node scheduling scheme for large wireless sensor networks. In First ACM International Workshop on Wireless Sensor Net-works and Applications WSNA02, pages 32–41, September 2002.

    Google Scholar 

  56. W. Ye, J. Heidemann, and D. Estrin. An energy-efficient mac protocol for wireless sensor networks. In Proceedings of IEEE INFOCOM 2002, June 2002.

    Google Scholar 

  57. J. Zhao, R. Govindan, and D. Estrin. Computing aggregates for monitoring wireless sensor networks. In Proceedings of the 1st International Workshop on Sensor Network Protocols and Applications, May 2003.

    Google Scholar 

  58. S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), pages 62–72, October 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this paper

Cite this paper

Sun, K., Ning, P., Wang, C. (2007). Secure and Resilient Time Synchronization in Wireless Sensor Networks. In: Poovendran, R., Roy, S., Wang, C. (eds) Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security, vol 30. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-46276-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-46276-9_15

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-32721-1

  • Online ISBN: 978-0-387-46276-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics