Secure time synchronization in sensor networks

Saurabh Ganeriwal, Christina Poepper, Srdjan Čapkun, Mani B. Srivastava

    Research output: Contribution to journalArticle

    Abstract

    Time synchronization is critical in sensor networks at many layers of their design. It enables better duty-cycling of the radio, accurate and secure localization, beamforming, and other collaborative signal processing tasks. These benefits make time-synchronization protocols a prime target of malicious adversaries who want to disrupt the normal operation of a sensor network. In this article, we analyze attacks on existing time synchronization protocols for wireless sensor networks and we propose a secure time synchronization toolbox to counter these attacks. This toolbox includes protocols for secure pairwise and group synchronization of nodes that either lie in the neighborhood of each other or are separated by multiple hops. We provide an in-depth analysis of the security and the energy overhead of the proposed protocols. The efficiency of these protocols has been tested through an experimental study on Mica2 motes.

    Original languageEnglish (US)
    Article number23
    JournalACM Transactions on Information and System Security
    Volume11
    Issue number4
    DOIs
    StatePublished - Jul 1 2008

    Fingerprint

    Sensor networks
    Synchronization
    Network protocols
    Beamforming
    Wireless sensor networks
    Signal processing

    Keywords

    • Delay
    • Message authentication code
    • Sensor networks
    • Time synchronization

    ASJC Scopus subject areas

    • Computer Science(all)
    • Safety, Risk, Reliability and Quality

    Cite this

    Secure time synchronization in sensor networks. / Ganeriwal, Saurabh; Poepper, Christina; Čapkun, Srdjan; Srivastava, Mani B.

    In: ACM Transactions on Information and System Security, Vol. 11, No. 4, 23, 01.07.2008.

    Research output: Contribution to journalArticle

    Ganeriwal, Saurabh ; Poepper, Christina ; Čapkun, Srdjan ; Srivastava, Mani B. / Secure time synchronization in sensor networks. In: ACM Transactions on Information and System Security. 2008 ; Vol. 11, No. 4.
    @article{afae10fb7ffd47d3940b0c0742ee0e97,
    title = "Secure time synchronization in sensor networks",
    abstract = "Time synchronization is critical in sensor networks at many layers of their design. It enables better duty-cycling of the radio, accurate and secure localization, beamforming, and other collaborative signal processing tasks. These benefits make time-synchronization protocols a prime target of malicious adversaries who want to disrupt the normal operation of a sensor network. In this article, we analyze attacks on existing time synchronization protocols for wireless sensor networks and we propose a secure time synchronization toolbox to counter these attacks. This toolbox includes protocols for secure pairwise and group synchronization of nodes that either lie in the neighborhood of each other or are separated by multiple hops. We provide an in-depth analysis of the security and the energy overhead of the proposed protocols. The efficiency of these protocols has been tested through an experimental study on Mica2 motes.",
    keywords = "Delay, Message authentication code, Sensor networks, Time synchronization",
    author = "Saurabh Ganeriwal and Christina Poepper and Srdjan Čapkun and Srivastava, {Mani B.}",
    year = "2008",
    month = "7",
    day = "1",
    doi = "10.1145/1380564.1380571",
    language = "English (US)",
    volume = "11",
    journal = "ACM Transactions on Information and System Security",
    issn = "1094-9224",
    publisher = "Association for Computing Machinery (ACM)",
    number = "4",

    }

    TY - JOUR

    T1 - Secure time synchronization in sensor networks

    AU - Ganeriwal, Saurabh

    AU - Poepper, Christina

    AU - Čapkun, Srdjan

    AU - Srivastava, Mani B.

    PY - 2008/7/1

    Y1 - 2008/7/1

    N2 - Time synchronization is critical in sensor networks at many layers of their design. It enables better duty-cycling of the radio, accurate and secure localization, beamforming, and other collaborative signal processing tasks. These benefits make time-synchronization protocols a prime target of malicious adversaries who want to disrupt the normal operation of a sensor network. In this article, we analyze attacks on existing time synchronization protocols for wireless sensor networks and we propose a secure time synchronization toolbox to counter these attacks. This toolbox includes protocols for secure pairwise and group synchronization of nodes that either lie in the neighborhood of each other or are separated by multiple hops. We provide an in-depth analysis of the security and the energy overhead of the proposed protocols. The efficiency of these protocols has been tested through an experimental study on Mica2 motes.

    AB - Time synchronization is critical in sensor networks at many layers of their design. It enables better duty-cycling of the radio, accurate and secure localization, beamforming, and other collaborative signal processing tasks. These benefits make time-synchronization protocols a prime target of malicious adversaries who want to disrupt the normal operation of a sensor network. In this article, we analyze attacks on existing time synchronization protocols for wireless sensor networks and we propose a secure time synchronization toolbox to counter these attacks. This toolbox includes protocols for secure pairwise and group synchronization of nodes that either lie in the neighborhood of each other or are separated by multiple hops. We provide an in-depth analysis of the security and the energy overhead of the proposed protocols. The efficiency of these protocols has been tested through an experimental study on Mica2 motes.

    KW - Delay

    KW - Message authentication code

    KW - Sensor networks

    KW - Time synchronization

    UR - http://www.scopus.com/inward/record.url?scp=49449093129&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=49449093129&partnerID=8YFLogxK

    U2 - 10.1145/1380564.1380571

    DO - 10.1145/1380564.1380571

    M3 - Article

    VL - 11

    JO - ACM Transactions on Information and System Security

    JF - ACM Transactions on Information and System Security

    SN - 1094-9224

    IS - 4

    M1 - 23

    ER -