2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems 2011
DOI: 10.1109/mass.2011.64
|View full text |Cite
|
Sign up to set email alerts
|

Secured Flooding Time Synchronization Protocol

Abstract: This research aims to complement security vulnerability of Flooding Time Synchronization Protocol (FTSP), which is currently one of the most sophisticated approaches for time synchronization in wireless sensor networks (WSNs). FTSP has advanced features like implicitly dynamic topology and high accuracy time, but its original design does not consider security issues. In order to defend against attacks from malicious nodes, we propose several techniques to reinforce the structure of FTSP. A reference node selec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 11 publications
(15 reference statements)
0
5
0
Order By: Relevance
“…Any malicious node can send false synchronization messages to the neighboring nodes and claim to be legitimate. To provide security for GTSP, filters [30] have been added into the architecture of GTSP as shown in Fig. 4.…”
Section: Time Synchronizationmentioning
confidence: 99%
“…Any malicious node can send false synchronization messages to the neighboring nodes and claim to be legitimate. To provide security for GTSP, filters [30] have been added into the architecture of GTSP as shown in Fig. 4.…”
Section: Time Synchronizationmentioning
confidence: 99%
“…They consider, in particular, the pulse-delay attacks. The security issues in flooding time synchronization has been studied by Huang et al [ 157 ], and they have introduced different methods to identify five different attacks that may hinder time synchronization operation. The methods presented by Sun et al [ 158 ] aim at using redundant time information to detect and mitigate the adverse effects of malicious nodes, which are, for example, conducting wormhole attacks [ 159 ].…”
Section: Time Synchronization Messagingmentioning
confidence: 99%
“…They are classified into two types: centralized and distributed time synchronization. The centralized time synchronization algorithms, such as Reference Broadcasts Synchronization (RBS), 4 Timing-sync Protocol for Sensor Networks (TPSN), 5 and Flooding Time Synchronization Protocol (FTSP), 6 have many advantages including fast convergence speed, low complexity, and high convergence precision. However, these synchronization algorithms are based on structure type and mostly depend on the reference node.…”
Section: Related Workmentioning
confidence: 99%