Attack-resilient time synchronization for wireless sensor networks

Research output: Contribution to journalArticlepeer-review

40 Scopus citations

Abstract

The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first identify various attacks that are effective to several representative time synchronization schemes, and then focus on a specific type of attack called delay attack, which cannot be addressed by cryptographic techniques. Next we propose two approaches to detect and accommodate the delay attack. Our first approach uses the generalized extreme studentized deviate (GESD) algorithm to detect multiple outliers introduced by the compromised nodes; our second approach uses a threshold derived using a time transformation technique to filter out the outliers. Finally we show the effectiveness of these two schemes through extensive simulations.

Original languageEnglish (US)
Pages (from-to)112-125
Number of pages14
JournalAd Hoc Networks
Volume5
Issue number1
DOIs
StatePublished - Jan 1 2007

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Attack-resilient time synchronization for wireless sensor networks'. Together they form a unique fingerprint.

Cite this