Secure network-wide clock synchronization in wireless sensor networks

Roberto Solis Robles, Jason J. Haas, Jerry T. Chiang, Yih Chun Hu, P. R. Kumar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Clock synchronization is of critical importance for several applications in wireless and mobile sensor networks; for example to determine the order and time of events. Although several protocols to achieve clock synchronization have been developed, they may not be secure. For instance, a link controlled by an attacker could delay packets it forwards in ways which would cause the nodes sharing that link to obtain faulty time estimates. In this paper, we propose a secure network-wide clock synchronization protocol. It also allows nodes to securely discover the network topology by detecting and isolating links that behave inconsistently. This networkwide clock synchronization protocol is built on ideas in [1] where inconsistent attacks are detected using timing information alone under certain conditions. The proposed protocol has been implemented and the results of experimentation on a twenty-five node network are presented.

Original languageEnglish (US)
Title of host publication2010 49th IEEE Conference on Decision and Control, CDC 2010
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages5616-5621
Number of pages6
ISBN (Print)9781424477456
DOIs
StatePublished - 2010
Event49th IEEE Conference on Decision and Control, CDC 2010 - Atlanta, United States
Duration: Dec 15 2010Dec 17 2010

Publication series

NameProceedings of the IEEE Conference on Decision and Control
ISSN (Print)0743-1546
ISSN (Electronic)2576-2370

Conference

Conference49th IEEE Conference on Decision and Control, CDC 2010
Country/TerritoryUnited States
CityAtlanta
Period12/15/1012/17/10

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Modeling and Simulation
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Secure network-wide clock synchronization in wireless sensor networks'. Together they form a unique fingerprint.

Cite this