TY - GEN
T1 - Attack-resilient time synchronization for wireless sensor networks
AU - Song, Hui
AU - Zhu, Sencun
AU - Cao, Guohong
N1 - Funding Information:
The authors would like to thank the anonymous reviewers for their helpful comments. A preliminary version of the paper appeared in IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2005 [28] . This work was supported in part by Army Research Office (W911NF-05-1-0270) and the National Science Foundation (CCR-0092770, CNS-0524156, and CNS-0519460). Any opinions, findings, conclusions, or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the US National Science Foundation or Army Research Office.
PY - 2005
Y1 - 2005
N2 - The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first identify various attacks that are effective to several representative time synchronization schemes, and then focus on a specific type of attack called delay attack, which cannot be addressed by cryptographic techniques. Next we propose two approaches to detect and accommodate the delay attack. Our first approach uses the generalized extreme studentized deviate (GESD) algorithm to detect multiple outliers introduced by the compromised nodes; our second approach uses a threshold derived using a time transformation technique to filter out the outliers. Finally we show the effectiveness of these two schemes through extensive simulations.
AB - The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first identify various attacks that are effective to several representative time synchronization schemes, and then focus on a specific type of attack called delay attack, which cannot be addressed by cryptographic techniques. Next we propose two approaches to detect and accommodate the delay attack. Our first approach uses the generalized extreme studentized deviate (GESD) algorithm to detect multiple outliers introduced by the compromised nodes; our second approach uses a threshold derived using a time transformation technique to filter out the outliers. Finally we show the effectiveness of these two schemes through extensive simulations.
UR - http://www.scopus.com/inward/record.url?scp=33750337174&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33750337174&partnerID=8YFLogxK
U2 - 10.1109/MAHSS.2005.1542869
DO - 10.1109/MAHSS.2005.1542869
M3 - Conference contribution
AN - SCOPUS:33750337174
SN - 0780394666
SN - 9780780394667
T3 - 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2005
SP - 765
EP - 772
BT - 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2005
T2 - 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2005
Y2 - 7 November 2005 through 10 November 2005
ER -