2008 IEEE Wireless Communications and Networking Conference 2008
DOI: 10.1109/wcnc.2008.551
|View full text |Cite
|
Sign up to set email alerts
|

Testbed Implementation of a Secure Flooding Time Synchronization Protocol

Abstract: A fundamental building block in distributed wireless sensor networks is time synchronization. Given resource constrained nature of sensor networks, previous research has focused on developing various energy efficient time synchronization protocols tailored for these networks. However, many of these protocols have not been designed with security in mind. In this paper, we describe FTSP which is one of the major time synchronization protocols for sensor networks. We outline the adverse effects of the time synchr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…• Security concern: As stated in [16], since the hardware of sensor nodes is not tamper-resistant, the attacker can control any sensor node through physical compromise and it can also acquire the secret keys to participate in legitimate inter-node communications. Even though some cryptographic protocols can be applied to inter-node communications, the attacker can still access the cryptographic keys through physical compromise in order to participate in the communications in a legitimate way.…”
Section: B2 Using Cumulative Path Loadmentioning
confidence: 99%
“…• Security concern: As stated in [16], since the hardware of sensor nodes is not tamper-resistant, the attacker can control any sensor node through physical compromise and it can also acquire the secret keys to participate in legitimate inter-node communications. Even though some cryptographic protocols can be applied to inter-node communications, the attacker can still access the cryptographic keys through physical compromise in order to participate in the communications in a legitimate way.…”
Section: B2 Using Cumulative Path Loadmentioning
confidence: 99%
“…Combining with RANSAC algorithm, every node can filter out the outlier messages from malicious nodes. However, these methods may cause unstable linear regression because the data is from different nodes [5]. As a result, the root selection problem still remains an open issue in FTSP.…”
Section: ) Attack On Root Selectionmentioning
confidence: 99%
“…When any node receives this fake message, it would find the seqN um inside this message higher than all current records and thus selects the malicious node as its reference node. The countermeasure of this seqN um attack is to use seqN um filter introduced in [5]. This seqN um filter uses extended data structure to collect data from randomly chosen k nodes out of total n neighbors and choose the node with smallest seqN um as reference node.…”
Section: ) Attack On Root Selectionmentioning
confidence: 99%
See 2 more Smart Citations