Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks
Security is an important factor that cannot be neglected in the design of time synchronization algorithms since industrial wireless sensor networks are prone to attacks against physical nodes and communication links. The Sybil attack is an intelligent attack with a high destructive capacity in prete...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-08-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/13/16/9223 |
_version_ | 1797585647769223168 |
---|---|
author | Zhaowei Wang Dehua Sun Chen Yu |
author_facet | Zhaowei Wang Dehua Sun Chen Yu |
author_sort | Zhaowei Wang |
collection | DOAJ |
description | Security is an important factor that cannot be neglected in the design of time synchronization algorithms since industrial wireless sensor networks are prone to attacks against physical nodes and communication links. The Sybil attack is an intelligent attack with a high destructive capacity in pretending multiple identities and broadcasting illegitimate messages to destroy the network operation. Existing secure time synchronization algorithms mostly focus on distributed protocols; however, they pay less attention to Sybil attacks and centralized network time synchronization. In this paper, we propose a novel reference broadcast-based secure time synchronization (RSTS) for industrial wireless sensor networks with a time source against Sybil attacks. Different from previous protocols, in converging the network structure and the clock status, RSTS employs a public neighbor forwarding mechanism based on reference broadcast to filter the illegal time information automatically. Instead of establishing a table with timestamps of packet transmission and receipt, the least square linear regression is utilized to estimate the compensation relative to the source node with the recorded time and calculated time difference in receiving packets. The simulation results demonstrate that RSTS is resilient to Sybil attacks as well as message manipulation attacks in comparison with existing algorithms. |
first_indexed | 2024-03-11T00:10:03Z |
format | Article |
id | doaj.art-ec8da140ab6149199cd4fec1b559c611 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-11T00:10:03Z |
publishDate | 2023-08-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-ec8da140ab6149199cd4fec1b559c6112023-11-19T00:06:22ZengMDPI AGApplied Sciences2076-34172023-08-011316922310.3390/app13169223Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor NetworksZhaowei Wang0Dehua Sun1Chen Yu2School of Electrical and Information Engineering, Jiangsu University, Zhenjiang 212013, ChinaSchool of Electrical and Information Engineering, Jiangsu University, Zhenjiang 212013, ChinaSchool of Electrical and Information Engineering, Jiangsu University, Zhenjiang 212013, ChinaSecurity is an important factor that cannot be neglected in the design of time synchronization algorithms since industrial wireless sensor networks are prone to attacks against physical nodes and communication links. The Sybil attack is an intelligent attack with a high destructive capacity in pretending multiple identities and broadcasting illegitimate messages to destroy the network operation. Existing secure time synchronization algorithms mostly focus on distributed protocols; however, they pay less attention to Sybil attacks and centralized network time synchronization. In this paper, we propose a novel reference broadcast-based secure time synchronization (RSTS) for industrial wireless sensor networks with a time source against Sybil attacks. Different from previous protocols, in converging the network structure and the clock status, RSTS employs a public neighbor forwarding mechanism based on reference broadcast to filter the illegal time information automatically. Instead of establishing a table with timestamps of packet transmission and receipt, the least square linear regression is utilized to estimate the compensation relative to the source node with the recorded time and calculated time difference in receiving packets. The simulation results demonstrate that RSTS is resilient to Sybil attacks as well as message manipulation attacks in comparison with existing algorithms.https://www.mdpi.com/2076-3417/13/16/9223time synchronizationsybil attackssecurityindustrial wireless sensor networksmessage manipulation attacks |
spellingShingle | Zhaowei Wang Dehua Sun Chen Yu Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks Applied Sciences time synchronization sybil attacks security industrial wireless sensor networks message manipulation attacks |
title | Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks |
title_full | Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks |
title_fullStr | Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks |
title_full_unstemmed | Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks |
title_short | Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks |
title_sort | reference broadcast based secure time synchronization for industrial wireless sensor networks |
topic | time synchronization sybil attacks security industrial wireless sensor networks message manipulation attacks |
url | https://www.mdpi.com/2076-3417/13/16/9223 |
work_keys_str_mv | AT zhaoweiwang referencebroadcastbasedsecuretimesynchronizationforindustrialwirelesssensornetworks AT dehuasun referencebroadcastbasedsecuretimesynchronizationforindustrialwirelesssensornetworks AT chenyu referencebroadcastbasedsecuretimesynchronizationforindustrialwirelesssensornetworks |