{"title":"SRST: A secure and resilient synchronization of time for WSNs in IoT applications","authors":"Amin Saiah , Chafika Benzaid , Mohamed Younis , Nadjib Badache","doi":"10.1016/j.adhoc.2024.103749","DOIUrl":null,"url":null,"abstract":"<div><div>Many applications of Wireless Sensor Networks (WSNs) in internet of things require accurate time synchronization for the successful realization. In a hostile environment, protecting time synchronization against faulty timestamps injection attacks is paramount. Malicious nodes (MNs) could broadcast faulty timestamps to decrease the accuracy of the whole network. The Receiver-Only (RO)-based synchronization methodology achieves high accuracy while reducing the number of timing messages compared to other methodologies. However, RO is vulnerable to node failure and supports only a single reference, which makes it inaccurate in the presence of MNs. To address these limitations, we propose SRST, a secure and resilient synchronization of time for WSNs. SRST employs a novel time synchronization model that extends RO to allow synchronizing sensor nodes to multiple mutually-synchronized references, which enhances robustness against node failure and malicious behavior. SRST optimizes convergence time by synchronizing the RO node with its synchronized 1-hop and 2-hop neighbors. RO node applies a new delay threshold-based detection technique to identify reference nodes as MNs through detection of faulty timestamps. SRST is topology-independent and can be applied to multi-tier, cluster-based and flat topologies. We validated SRST through simulations and prototype experiments, comparing its performance with several state-of-the-art protocols. The results demonstrate that SRST outperforms existing protocols in accuracy, achieving synchronization within less than <span><math><mrow><mn>1</mn><mspace></mspace><mi>μ</mi><mi>s</mi></mrow></math></span>, and accelerates convergence time by a factor of 31.25 compared to the best-known protocol. SRST has also been shown to be more effective in mitigating faulty timestamp injection attacks, successfully detecting errors of <span><math><mrow><mn>6</mn><mspace></mspace><mi>μ</mi><mi>s</mi></mrow></math></span> with a 100% success rate and ensuring that the clocks of any two nodes do not deviate by more than <span><math><mrow><mn>6</mn><mspace></mspace><mi>μ</mi><mi>s</mi></mrow></math></span>. Furthermore, the results indicate that SRST imposes little communication overhead.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"169 ","pages":"Article 103749"},"PeriodicalIF":4.4000,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870524003603","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Many applications of Wireless Sensor Networks (WSNs) in internet of things require accurate time synchronization for the successful realization. In a hostile environment, protecting time synchronization against faulty timestamps injection attacks is paramount. Malicious nodes (MNs) could broadcast faulty timestamps to decrease the accuracy of the whole network. The Receiver-Only (RO)-based synchronization methodology achieves high accuracy while reducing the number of timing messages compared to other methodologies. However, RO is vulnerable to node failure and supports only a single reference, which makes it inaccurate in the presence of MNs. To address these limitations, we propose SRST, a secure and resilient synchronization of time for WSNs. SRST employs a novel time synchronization model that extends RO to allow synchronizing sensor nodes to multiple mutually-synchronized references, which enhances robustness against node failure and malicious behavior. SRST optimizes convergence time by synchronizing the RO node with its synchronized 1-hop and 2-hop neighbors. RO node applies a new delay threshold-based detection technique to identify reference nodes as MNs through detection of faulty timestamps. SRST is topology-independent and can be applied to multi-tier, cluster-based and flat topologies. We validated SRST through simulations and prototype experiments, comparing its performance with several state-of-the-art protocols. The results demonstrate that SRST outperforms existing protocols in accuracy, achieving synchronization within less than , and accelerates convergence time by a factor of 31.25 compared to the best-known protocol. SRST has also been shown to be more effective in mitigating faulty timestamp injection attacks, successfully detecting errors of with a 100% success rate and ensuring that the clocks of any two nodes do not deviate by more than . Furthermore, the results indicate that SRST imposes little communication overhead.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.