Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-76627-8_26
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Self-stabilizing Clock Synchronization in Sensor Networks

Abstract: Abstract. In sensor networks, correct clocks have arbitrary starting offsets and nondeterministic fluctuating skews. We consider an adversary that aims at tampering with the clock synchronization by intercepting messages, replaying intercepted messages (after the adversary's choice of delay), and capturing nodes (i.e., revealing their secret keys and impersonating them). We present the first self-stabilizing algorithm for secure clock synchronization in sensor networks that is resilient to such an adversary's … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Publication Types

Select...
2
2
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Lemmas 3 and 4 refer to the cases when τ > 2∆ and τ > max{4δ, ∆ + 1} for which Lemma 5 shows that the communication delay (during convergence) of the former case is δ times shorter than the latter. The proof shows that we can apply the analysis of [12], because the back off process of a passive node counts r unused timeslots, where r is a random choice in [1, 3∆]. The lemma statement denotes the latency period by := (1 − e −1 ) −1 .…”
Section: Backof F ()mentioning
confidence: 99%
“…Lemmas 3 and 4 refer to the cases when τ > 2∆ and τ > max{4δ, ∆ + 1} for which Lemma 5 shows that the communication delay (during convergence) of the former case is δ times shorter than the latter. The proof shows that we can apply the analysis of [12], because the back off process of a passive node counts r unused timeslots, where r is a random choice in [1, 3∆]. The lemma statement denotes the latency period by := (1 − e −1 ) −1 .…”
Section: Backof F ()mentioning
confidence: 99%
“…In [32], we presented the first secure and self-stabilizing algorithm for clock synchronization in sensor networks. Clustering organizes a network into groups that, e.g., can be used for forming backbones, for routing, for aggregating data, and for building hierarchies that allow for scaling.…”
Section: B Sensor Networkmentioning
confidence: 99%
“…We assume that the system has access to a self-stabilizing clock synchronization mechanism (such as [31,32]), that facilitates the agreement on a particular time slot once in every T time slot. The algorithm makes sure that in that time slot (1) every tiny artifact stores the values of all urns in out put (see line 30), (2) no tiny artifact draws a ball from its urn (see line 31), (3) every tiny artifact restarts its state (by assigning the urn with the initial value of one black ball and one white ball; see line 32).…”
Section: Self-stabilizationmentioning
confidence: 99%