Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Real Time Execution of Secure Time Synchronization in Wireless Sensor Networks  
  Authors : Piyush Dhule; Chetan Pise; Sarika Bongade
  Cite as:

 

Wireless Sensor Network and security is innovative research area for some research aspirants. Time synchronization is the delicate part in the Wireless Sensor Network (WSN) due to the requirement of coordination between sensor nodes. Also security plays important role to avoid attacks on time synchronization. In this paper, we have shown necessity of secure time synchronization, problem related with synchronization, how secure time synchronization can be achieved on sink node with reduced energy consumption, quickness in effective manner. Our scheme removes different threats on synchronization and makes system more robust. We have provided centralized control in distributed wireless sensor network which reduces complexity of real time application of wireless sensor network.

 

Published In : IJCSN Journal Volume 4, Issue 2

Date of Publication : April 2015

Pages : 351 - 356

Figures : 07

Tables : --

Publication Link : Real Time Execution of Secure Time Synchronization in Wireless Sensor Networks

 

 

 

Piyush Dhule : Computer Technology Department, Rajiv Gandhi College of Engineering and Research, RTMNU, Nagpur, Maharashtra, India

Chetan Pise : Information Technology Department, Rajiv Gandhi College of Engineering and Research, RTMNU, Nagpur, Maharashtra, India

Sarika Bongade : Computer Science and Engineering Department, Rajiv Gandhi College of Engineering and Research, RTMNU, Nagpur, Maharashtra, India

 

 

 

 

 

 

 

Wireless Sensor Network

Secure Time Synchronization

Reduced Energy Consumption

Dead zone (of image)

Real Time

Centralized Control

Mostly the techniques for secure time synchronization send different synchronization messages, in some techniques static pair wise key-based cryptographic mechanisms is used in order to provide secure synchronization. Some techniques uses GPS, sensor nodes have resource limitation, also data transmission cost is significant in wireless sensor networks. We tried to overcome such problem and provided secure synchronization in WSNs. We have focused on reducing the communication overhead in the network so that the energy requirement reduces and that energy can be use for security purpose.

 

 

 

 

 

 

 

 

 

[1] International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012 [2] S. Ganeriwal, C. P¨opper, S. ?Capkun, and M. B. Srivastava, “Secure time synchronization in sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 11, no. 4, pp. 1–35, 2008. [3] H. Song, S. Zhu, and G. Cao, “Attack-resilient time synchronization for wireless sensor networks,” Ad Hoc Networks, vol. 5, pp. 112–125, 2005. [4] K. Sun, P. Ning, and C. Wang, “Secure and resilient clock synchronization in wireless sensor networks,” IEEE JSAC, vol. 24, no. 2, pp.395–408, Feb. 2006 [5] S. Ganeriwal, C. P¨opper, S. ?Capkun, and M. B. Srivastava, “Secure time synchronization in sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 11, no. 4, pp. 1–35, 2008 [6] S. Mizanur Rahman, N. Nasser, and T. Taleb, “Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve,” Wireless Communications and Mobile Computing, 2009. [7] Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “Spins: security protocols for sensor networks,” Kluwer Wireles Networks, vol. 8,no. 5, pp. 521–534, 2002. [8] D. Scott, “Relying on time synchronization for security in ad hoc networks,” in Proc. of 43rd ACM Southeast Conference, March 2005 [9] J. Jeong and Z. Haas, “Predeployed secure key distribution mechanisms in sensor networks: current state-of-the-art and a new approach using time information,” IEEE Wireless Communications, vol. 15, no. 4, pp.42–51, Aug. 2008. [10] Vijayalakshmi, Dr. T.G.Palanivelu and N.Agalya “Secure Time Synchronization against Malicious Attacks for Wireless Sensor Networks” Department of Electronics and Communication Engineering, Pondicherry Engineering College [11] A.Selcuk Uluagac_ Raheem A. Beyah† John A. Copeland ”Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Network” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 4, APRIL 2013 [12] RC6-by-Morgan-Monger-2004-Fall http://www.docshut.com/hohohohohohohohor/Morgan.ht ml [13] B. A. Forouzan, Data Communications and Networking (4th edition).McGraw-Hill, 2007. [14] L. Lamport and P. Melliar-Smith, “Synchronizing clocks in the presenceof faults,” J. ACM, vol. 32, no. 1, pp. 52– 78, 1985 [15] R. V. et al., “Encryption overhead in embedded systems and sensor network nodes: modeling and analysis,” in Proc. of ACM CASES ’03,2003, pp. 188–197 [16] E. S. D. Guimaraes, G.; Souto and J. Kelner, “Evaluation of security mechanisms in wireless sensor networks,” in Systems Communications Proceedings, 2005 [17] S. Meulenaer, Gosset and Pereira, “On the energy cost of communication and cryptography in wireless sensor networks.” [18] Yin, Qi, Fu, “ASTS: An agile secure time synchronization protocol for wireless sensor networks,” in Wireless Communications, Networking and Mobile Computing, 2007.