Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks

Security is an important factor that cannot be neglected in the design of time synchronization algorithms since industrial wireless sensor networks are prone to attacks against physical nodes and communication links. The Sybil attack is an intelligent attack with a high destructive capacity in prete...

Full description

Bibliographic Details
Main Authors: Zhaowei Wang, Dehua Sun, Chen Yu
Format: Article
Language:English
Published: MDPI AG 2023-08-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/16/9223
_version_ 1797585647769223168
author Zhaowei Wang
Dehua Sun
Chen Yu
author_facet Zhaowei Wang
Dehua Sun
Chen Yu
author_sort Zhaowei Wang
collection DOAJ
description Security is an important factor that cannot be neglected in the design of time synchronization algorithms since industrial wireless sensor networks are prone to attacks against physical nodes and communication links. The Sybil attack is an intelligent attack with a high destructive capacity in pretending multiple identities and broadcasting illegitimate messages to destroy the network operation. Existing secure time synchronization algorithms mostly focus on distributed protocols; however, they pay less attention to Sybil attacks and centralized network time synchronization. In this paper, we propose a novel reference broadcast-based secure time synchronization (RSTS) for industrial wireless sensor networks with a time source against Sybil attacks. Different from previous protocols, in converging the network structure and the clock status, RSTS employs a public neighbor forwarding mechanism based on reference broadcast to filter the illegal time information automatically. Instead of establishing a table with timestamps of packet transmission and receipt, the least square linear regression is utilized to estimate the compensation relative to the source node with the recorded time and calculated time difference in receiving packets. The simulation results demonstrate that RSTS is resilient to Sybil attacks as well as message manipulation attacks in comparison with existing algorithms.
first_indexed 2024-03-11T00:10:03Z
format Article
id doaj.art-ec8da140ab6149199cd4fec1b559c611
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-11T00:10:03Z
publishDate 2023-08-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-ec8da140ab6149199cd4fec1b559c6112023-11-19T00:06:22ZengMDPI AGApplied Sciences2076-34172023-08-011316922310.3390/app13169223Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor NetworksZhaowei Wang0Dehua Sun1Chen Yu2School of Electrical and Information Engineering, Jiangsu University, Zhenjiang 212013, ChinaSchool of Electrical and Information Engineering, Jiangsu University, Zhenjiang 212013, ChinaSchool of Electrical and Information Engineering, Jiangsu University, Zhenjiang 212013, ChinaSecurity is an important factor that cannot be neglected in the design of time synchronization algorithms since industrial wireless sensor networks are prone to attacks against physical nodes and communication links. The Sybil attack is an intelligent attack with a high destructive capacity in pretending multiple identities and broadcasting illegitimate messages to destroy the network operation. Existing secure time synchronization algorithms mostly focus on distributed protocols; however, they pay less attention to Sybil attacks and centralized network time synchronization. In this paper, we propose a novel reference broadcast-based secure time synchronization (RSTS) for industrial wireless sensor networks with a time source against Sybil attacks. Different from previous protocols, in converging the network structure and the clock status, RSTS employs a public neighbor forwarding mechanism based on reference broadcast to filter the illegal time information automatically. Instead of establishing a table with timestamps of packet transmission and receipt, the least square linear regression is utilized to estimate the compensation relative to the source node with the recorded time and calculated time difference in receiving packets. The simulation results demonstrate that RSTS is resilient to Sybil attacks as well as message manipulation attacks in comparison with existing algorithms.https://www.mdpi.com/2076-3417/13/16/9223time synchronizationsybil attackssecurityindustrial wireless sensor networksmessage manipulation attacks
spellingShingle Zhaowei Wang
Dehua Sun
Chen Yu
Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks
Applied Sciences
time synchronization
sybil attacks
security
industrial wireless sensor networks
message manipulation attacks
title Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks
title_full Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks
title_fullStr Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks
title_full_unstemmed Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks
title_short Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks
title_sort reference broadcast based secure time synchronization for industrial wireless sensor networks
topic time synchronization
sybil attacks
security
industrial wireless sensor networks
message manipulation attacks
url https://www.mdpi.com/2076-3417/13/16/9223
work_keys_str_mv AT zhaoweiwang referencebroadcastbasedsecuretimesynchronizationforindustrialwirelesssensornetworks
AT dehuasun referencebroadcastbasedsecuretimesynchronizationforindustrialwirelesssensornetworks
AT chenyu referencebroadcastbasedsecuretimesynchronizationforindustrialwirelesssensornetworks