2009 International Conference on Ultra Modern Telecommunications &Amp; Workshops 2009
DOI: 10.1109/icumt.2009.5345607
|View full text |Cite
|
Sign up to set email alerts
|

SecSyWiSe: A secure time synchronization scheme in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…SyWiSe protocol [18] resists the replay attack by counter mechanism. Communication is preceded by the synchronization time distribution between nodes and shared only when active, in order to safeguard energy load.…”
Section: G Secsywisesecmentioning
confidence: 99%
“…SyWiSe protocol [18] resists the replay attack by counter mechanism. Communication is preceded by the synchronization time distribution between nodes and shared only when active, in order to safeguard energy load.…”
Section: G Secsywisesecmentioning
confidence: 99%
“…We assume security mechanisms [12,13] are in place to protect the localization service. Similarly, we assume that the time synchronization mechanism is also secure [14,15].…”
Section: Adversarial Modelmentioning
confidence: 99%
“…A secure time synchronization service is required to maintain time consistency across the entire network -since SMP-FPR relies on temporal dimension in order to estimate the quality of paths by time-stamping certain protocol messages (e.g., RREQ messages). We rely on solutions such as [15,14] to provide security guarantees over the time synchronization services. We assume that the localization and time synchronization services are robust to abuses towards resource depletion via link and physical layer jamming [21].…”
Section: Assumptionsmentioning
confidence: 99%
“…By general scientific notion, resilience to faulty devices can be achieved through redundancy of end-devices, information validation during communication, etc. [10,11,12]. Nonetheless, integrating the requirements of either energy e ciency or adaptability with fault resilience poses a non-trivial challenge.…”
Section: Major Requirements In Designing An Iot Solutionmentioning
confidence: 99%
“…Existing communication algorithms in IoT applications address one or at most two of the requirements discussed earlier, while none of them simultaneously addresses all three of them. Although adaptability has been addressed independently in various existing solutions [12,19], we analyze the literature on energy-e cient solutions and resilient solutions that integrate adaptability. This allows for the comparison of existing state-of-the-art that is closest to our proposed solution of collectively addressing all the requirements discussed earlier.…”
Section: Existing Solutions Address a Subset Of The Major Requirementsmentioning
confidence: 99%