Wireless Sensor Network and security is innovative
research area for some research aspirants. Time synchronization
is the delicate part in the Wireless Sensor Network (WSN) due
to the requirement of coordination between sensor nodes. Also
security plays important role to avoid attacks on time
synchronization. In this paper, we have shown necessity of
secure time synchronization, problem related with
synchronization, how secure time synchronization can be
achieved on sink node with reduced energy consumption,
quickness in effective manner. Our scheme removes different
threats on synchronization and makes system more robust. We
have provided centralized control in distributed wireless sensor
network which reduces complexity of real time application of
wireless sensor network.
Piyush Dhule : Computer Technology Department, Rajiv Gandhi College of Engineering and Research, RTMNU,
Nagpur, Maharashtra, India
Chetan Pise : Information Technology Department, Rajiv Gandhi College of Engineering and Research, RTMNU,
Nagpur, Maharashtra, India
Sarika Bongade : Computer Science and Engineering Department, Rajiv Gandhi College of Engineering and Research, RTMNU,
Nagpur, Maharashtra, India
Wireless Sensor Network
Secure Time
Synchronization
Reduced Energy Consumption
Dead zone (of image)
Real Time
Centralized Control
Mostly the techniques for secure time synchronization
send different synchronization messages, in some
techniques static pair wise key-based cryptographic
mechanisms is used in order to provide secure
synchronization. Some techniques uses GPS, sensor nodes
have resource limitation, also data transmission cost is
significant in wireless sensor networks. We tried to
overcome such problem and provided secure
synchronization in WSNs. We have focused on reducing
the communication overhead in the network so that the
energy requirement reduces and that energy can be use for
security purpose.
[1] International Journal of Engineering and Innovative
Technology (IJEIT) Volume 2, Issue 3, September
2012
[2] S. Ganeriwal, C. P¨opper, S. ?Capkun, and M. B.
Srivastava, “Secure time synchronization in sensor
networks,” ACM Trans. Inf. Syst. Secur., vol. 11, no. 4,
pp. 1–35, 2008.
[3] H. Song, S. Zhu, and G. Cao, “Attack-resilient time
synchronization for wireless sensor networks,” Ad Hoc
Networks, vol. 5, pp. 112–125, 2005.
[4] K. Sun, P. Ning, and C. Wang, “Secure and resilient
clock synchronization in wireless sensor networks,”
IEEE JSAC, vol. 24, no. 2, pp.395–408, Feb. 2006
[5] S. Ganeriwal, C. P¨opper, S. ?Capkun, and M. B.
Srivastava, “Secure time synchronization in sensor
networks,” ACM Trans. Inf. Syst. Secur., vol. 11, no. 4,
pp. 1–35, 2008
[6] S. Mizanur Rahman, N. Nasser, and T. Taleb, “Secure
timing synchronization for heterogeneous sensor network
using pairing over elliptic curve,” Wireless
Communications and Mobile Computing, 2009.
[7] Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E.
Culler, “Spins: security protocols for sensor networks,”
Kluwer Wireles Networks, vol. 8,no. 5, pp. 521–534,
2002.
[8] D. Scott, “Relying on time synchronization for security
in ad hoc networks,” in Proc. of 43rd ACM Southeast
Conference, March 2005
[9] J. Jeong and Z. Haas, “Predeployed secure key
distribution mechanisms in sensor networks: current
state-of-the-art and a new approach using time
information,” IEEE Wireless Communications, vol. 15,
no. 4, pp.42–51, Aug. 2008.
[10] Vijayalakshmi, Dr. T.G.Palanivelu and N.Agalya
“Secure Time Synchronization against Malicious Attacks
for Wireless Sensor Networks” Department of Electronics and Communication Engineering,
Pondicherry Engineering College
[11] A.Selcuk Uluagac_ Raheem A. Beyah† John A.
Copeland ”Secure SOurce-BAsed Loose
Synchronization (SOBAS) for Wireless Sensor Network”
IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 24, NO. 4, APRIL
2013
[12] RC6-by-Morgan-Monger-2004-Fall
http://www.docshut.com/hohohohohohohohor/Morgan.ht
ml
[13] B. A. Forouzan, Data Communications and Networking
(4th edition).McGraw-Hill, 2007.
[14] L. Lamport and P. Melliar-Smith, “Synchronizing clocks
in the presenceof faults,” J. ACM, vol. 32, no. 1, pp. 52–
78, 1985
[15] R. V. et al., “Encryption overhead in embedded systems
and sensor network nodes: modeling and analysis,” in
Proc. of ACM CASES ’03,2003, pp. 188–197
[16] E. S. D. Guimaraes, G.; Souto and J. Kelner,
“Evaluation of security mechanisms in wireless sensor
networks,” in Systems Communications Proceedings,
2005
[17] S. Meulenaer, Gosset and Pereira, “On the energy cost of
communication and cryptography in wireless sensor
networks.”
[18] Yin, Qi, Fu, “ASTS: An agile secure time
synchronization protocol for wireless sensor networks,”
in Wireless Communications, Networking and Mobile
Computing, 2007.