The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - April (2013 vol.24)
pp: 803-813
A. Selcuk Uluagac , Commun. Syst. Center, Georgia Inst. of Technol., Atlanta, GA, USA
R. A. Beyah , Commun. Assurance & PerformanceGroup, Georgia Inst. of Technol., Atlanta, GA, USA
J. A. Copeland , Commun. Syst. Center, Georgia Inst. of Technol., Atlanta, GA, USA
ABSTRACT
We present the Secure SOurce-BAsed Loose Synchronization (SOBAS) protocol to securely synchronize the events in the network, without the transmission of explicit synchronization control messages. In SOBAS, nodes use their local time values as a one-time dynamic key to encrypt each message. In this way, SOBAS provides an effective dynamic en-route filtering mechanism, where the malicious data is filtered from the network. With SOBAS, we are able to achieve our main goal of synchronizing events at the sink as quickly, as accurately, and as surreptitiously as possible. With loose synchronization, SOBAS reduces the number of control messages needed for a WSN to operate providing the key benefits of reduced energy consumption as well as reducing the opportunity for malicious nodes to eavesdrop, intercept, or be made aware of the presence of the network. Albeit a loose synchronization per se, SOBAS is also able to provide 7.24 μs clock precision given today's sensor technology, which is much better than other comparable schemes (schemes that do not employ GPS devices). Also, we show that by recognizing the need for and employing loose time synchronization, necessary synchronization can be provided to the WSN application using half of the energy needed for traditional schemes. Both analytical and simulation results are presented to verify the feasibility of SOBAS as well as the energy consumption of the scheme under normal operation and attack from malicious nodes.
INDEX TERMS
wireless sensor networks, cryptographic protocols, filtering theory, routing protocols, synchronisation, telecommunication security, time 7.24 mus, secure source-based loose synchronization protocol, SOBAS protocol, wireless sensor networks, synchronization control messages, dynamic en-route filtering mechanism, WSN, reduced energy consumption, sensor technology, Synchronization, Cryptography, Wireless sensor networks, Clocks, Protocols, Global Positioning System, sensor-based cyber-physical systems, Secure loose synchronization, secure time synchronization for wireless sensor networks, SOBAS, wireless sensor networks
CITATION
A. Selcuk Uluagac, R. A. Beyah, J. A. Copeland, "Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks", IEEE Transactions on Parallel & Distributed Systems, vol.24, no. 4, pp. 803-813, April 2013, doi:10.1109/TPDS.2012.170
REFERENCES
[1] G.J. Pottie and W.J. Kaiser, "Wireless Integrated Network Sensors," Comm. ACM, vol. 43, no. 5, pp. 51-58, 2000.
[2] R. Roman, C. Alcaraz, and J. Lopez, "A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes," Mobile Networks and Applications, vol. 12, no. 4, pp. 231-244, Aug. 2007.
[3] O. Akan and I. Akyildiz, "Event-to-Sink Reliable Transport in Wireless Sensor Networks," IEEE/ACM Trans. Networking, vol. 13, no. 5, pp. 1003-1017, Oct. 2005.
[4] S. Uluagac, C. Lee, R. Beyah, and J. Copeland, "Designing Secure Protocols for Wireless Sensor Networks," Wireless Algorithms, Systems, and Applications, vol. 5258, pp. 503-514, 2008.
[5] D. of Defense, Department of Defense Dictionary of Military and Assoc. Terms, Joint Publication 1-02, 2001.
[6] B. Nguyen and R. Rom, "Communication Services under EMCON," Proc. ACM SIGCOMM, pp. 275-281. 1986,
[7] A.S. Uluagac, R.A. Beyah, and J.A. Copeland, "TIme-Based Dynamic Keying and En-Route Filtering (TICK) for Wireless Sensor Networks," Proc. IEEE Global Comm. Conf. (Globecom), 2010.
[8] A. Boukerche and D. Turgut, "Secure Time Synchronization Protocols for Wireless Sensor Networks," IEEE Wireless Comm., vol. 14, no. 5, pp. 64-69, Oct. 2007.
[9] Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Computer Comm., vol. 30, nos. 11/12, pp. 2314-2341, 2007.
[10] S. Ganeriwal, C. Pöpper, S. Čapkun, and M.B. Srivastava, "Secure time Synchronization in Sensor Networks," ACM Trans. Information and System Security, vol. 11, no. 4, pp. 1-35, 2008.
[11] S. Ganeriwal, S. Čapkun, C.-C. Han, and M.B. Srivastava, "Secure time Synchronization Service for Sensor Networks," Proc. ACM Workshop Wireless Security (WiSe), pp. 97-106, 2005,
[12] A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler, "Spins: Security Protocols for Sensor Networks," Wireles Networks, vol. 8, no. 5, pp. 521-534, 2002.
[13] Z. Yu and Y. Guan, "A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks," Proc. IEEE INFOCOM, pp. 1-12, Apr. 2006.
[14] F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sensor Networks," IEEE J. Selected Areas Comm., vol. 23, no. 4, pp. 839-850, Apr. 2005.
[15] C. Kraub, M. Schneider, K. Bayarou, and C. Eckert, "Stef: A Secure Ticket-Based En-Route Filtering Scheme for Wireless Sensor Networks," Proc. Second Int'l Conf. Availability, Reliability and Security (ARES), pp. 310-317, Apr. 2007.
[16] A. Uluagac, R. Beyah, Y. Li, and J. Copeland, "Vebek: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 9, no. 7, pp. 994-1007, July 2010.
[17] K. Sun, P. Ning, and C. Wang, "Secure and Resilient Clock Synchronization in Wireless Sensor Networks," IEEE J. Selected Areas Comm., vol. 24, no. 2, pp. 395-408, Feb. 2006.
[18] K. Sun, P. Ning, and C. Wang, "Tinysersync: Secure and Resilient time Synchronization in Wireless Sensor Networks," Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), pp. 264-277, 2006.
[19] B.A. Forouzan, Data Comm. and Networking, fourth ed. McGraw-Hill, 2007.
[20] F. Ren, C. Lin, and F. Liu, "Self-Correcting Time Synchronization Using Reference Broadcast in Wireless Sensor Network," IEEE Wireless Comm., vol. 15, no. 4, pp. 79-85, Aug. 2008.
[21] H. Yoshida and T. Mori, "Development of Precision Underwater Positioning System," Proc. Underwater Technology and Workshop Scientific Use of Submarine Cables and Related Technologies Symp., pp. 217-222, Apr. 2007.
[22] J.W. Youngberg, Method for Extending GPS to Underwater Applications, US Patent 5119341, Washington, D.C.: Patent and Trademark Office, 1992.
[23] C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks," Proc. ACM MOBICOM, pp. 56-67, Aug. 2002.
[24] ATmega128/L Datasheet, Atmel Corp., www.atmel.com/atmel/acrobatdoc2467.pdf, June 2008.
[25] CC2420DataSheet, 2.4 GHz IEEE 802.15.4 / ZigBee-ready RF Transceiver Rev. B, Chipcon Products from Texas Instruments, focus.ti.com/lit/ds/symlinkcc2420.pdf, Nov. 2008.
[26] E. Barker and A. Roginsky, "Transitions: Recommendation for Transitioning the Use of Cryptographic, Algorithms and Key Lengths," NIST Special Publication 800-131A, Jan. 2011.
[27] R.V. Venugopalan, "Encryption Overhead in Embedded Systems and Sensor Network Nodes: Modeling and Analysis," Proc. Int'l Conf. Compilers, Architecture and Synthesis for Embedded Systems (CASES '03), pp. 188-197. 2003.
[28] M. Passing and F. Dressler, "Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes," Proc IEEE Int'l Conf. Mobile Adhoc and Sensor Systems (MASS), pp. 882-887, Oct. 2006.
[29] S.R. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4," Proc. Revised Papers from the Eighth Ann. Int'l Workshop Selected Areas in Cryptography (SAC), pp. 1-24, 2001.
[30] I. Mironov, "(not so) Random Shuffles of RC4," Cryptology Eprint Archive, Report 2002/067, http:/eprint.iacr.org/, 2002.
[31] S. Ganeriwal, R. Kumar, and M.B. Srivastava, "Timing-Sync Protocol for Sensor Networks," Proc. ACM First Int'l Conf. Embedded Networked Sensor Systems (SenSys), pp. 138-149, 2003.
[32] Xbow, "Crossbow Technology," http:/www.xbow.com/, 2008.
[33] MSP430x1xx Family User's Guide Rev. F, Texas Instruments, http://www.ti.commsp430, Nov. 2008.
[34] G.T.S.N. Simulator, "Gtsnets," 2007.
[35] K. Akkaya and M. Younis, "A Survey on Routing Protocols for Wireless Sensor Networks," Ad Hoc Networks J., vol. 3, pp. 325-349, May 2005.
87 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool