Open Access Open Access  Restricted Access Subscription Access

Resilient Consensus-Based Time Synchronization with Distributed Sybil Attack Detection Strategy for Wireless Sensor Networks: A Graph Theoretic Approach


Affiliations
1 Department of Computer Science and Engineering, MBM University, Jodhpur, Rajasthan, India
2 Department of Computer Science and Engineering, PMEC, Berhampur, Odisha, India
 

Security attacks on time synchronization services prevent the Wireless Sensor Networks (WSNs) from operating consistently and possibly cause the system to go down entirely. One of the most vulnerable attack types where a node falsely assumes many identities is the Sybil attack. Despite receiving a lot of attention for their simplicity and distributed nature, consensus-based time synchronization (CTS) algorithms in WSN do not exhibit robust behavior when subjected to a Sybil attack. In this context, a message-level Sybil detection mechanism, the Sybil resilient consensus time synchronization protocol (SRCTS), is proposed using a graph-theoretic approach. A novel distributed mechanism based on connected component theory is proposed to detect and filter Sybil messages. The comparison has been shown with Robust and secure Time Synchronization Protocol (RTSP) and Node-identification-based secure time synchronization protocols (NiSTS) for detection and convergence speed. The Sybil message detection rate is improved by 6% as compared to SRCTS vs RTSP and by 14% as compared to SRCTS vs NiSTS. Simulation results exhibit that the SRCTS algorithm is 62% more effective as compared to NiSTS and 45% more efficient than RTSP in terms of convergence rate. An in-depth mathematical analysis is presented to prove the correctness of the algorithms, and the message complexity is proven to be O(n2). The algorithm is validated through extensive simulation results.

Keywords

Connected Components, Consensus-Based Time Synchronization (CTS), Graph Theory, Sybil Attack, Wireless Sensor Network, Message Graph, Conformance Property.
User
Notifications
Font Size

  • Zhang Xuxin , Liu Yanzhang& Zhang Ya , "A Secure Clock Synchronization Scheme for Wireless Sensor Networks Against Malicious Attacks", Journal of Systems Science and Complexity volume 34,https://doi.org/10.1007/s11424-021-0002-y, pages 2125–2138, 04 February 2021.
  • Kobo, H.I.; Abu-Mahfouz, A.M.; Hancke, G.P,"A survey on software-defined wireless sensor networks: Challenges and design requirements". IEEE Access 2017, 5, 1872–1899
  • Du Shengli, Wang Y, Dong L, "Secure consensus of multiagent systems with DoS attacks via a graph-based approach", https://doi.org/10.1016/j.ins.2021.03.0540020-0255, Elsevier 2021
  • Wang, Z.; Zeng, P.; Zhou, M.; Li, D.; Wang, J. "Cluster-based maximum consensus time synchronization for industrial wireless sensor networks". Sensors 2017, 17, 141.
  • Hansdah, R.C.; Swain, A.R. "A model for the classification and survey of clock synchronization protocols in WSNs". Ad Hoc Network. 2015, 27, 219–241.
  • Schenato, L.; Fiorentin, “Average TimeSynch: A consensus-based protocol for clock synchronization in wireless sensor networks”. Automatica 2011, 47, 1878–1886
  • Sarvghadi, M.A.; Wan, T.C. "Message Passing Based Time Synchronization in Wireless Sensor Networks: A Survey". Int. J. Distrib. Sens. Netw. 2016, 12, 1280904.
  • Ganeriwal, P.; Kumar, P.; Srivastava, M.B. "Timing-sync protocol for sensor networks". In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, USA, 5–7 November 2013; pp. 138–149.
  • Yildirim, K.S.; Kantarci, A.,"Time synchronization based on slow-flooding in wireless sensor networks".IEEE Trans. Parallel Distrib. Syst. 2014, 25, 244–253
  • Alsaedi, N.; Hashim, F.; Sali, A.; Rokhani, F.Z., "Detecting Sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)". Comput. Commun. 2017, 110, 75–82.
  • Wu Yiming, "Secure Consensus Control for Multi-Agent Systems with Attacks and Communication Delays", CAA Journal of Automatica Sinica · January 2017, DOI: 10.1109/JAS.2016.7510010
  • Ganeriwal, S.; Han, C.C.; Srivastava, M.B. "Secure time synchronization service for sensor networks". In Proceedings of the 4th ACM Workshop on Wireless Security, Cologne, Germany, 2 September 2005; pp. 97–106.
  • Rahman, M.; El-Khatib, K. "Secure time synchronization for wireless sensor networks based on bilinear pairing functions". IEEE Trans. Parallel. Distrib. Syst. 2010.
  • Hu, X.; Park, T.; Shin, K.G., "Attack-tolerant time-synchronization in wireless sensor networks". In Proceedings of the 27th Conference on Computer Communications (IEEE INFOCOM), Phoenix, AZ, USA, 13–18 April 2008; pp. 41–45.
  • He, J.; Cheng, P.; Shi, L.; Chen, J., "SATS: Secure average-consensus-based time synchronization in wireless sensor networks". IEEE Trans. Signal Process. 2013, 61, 6387–6400.
  • Dong, W.; Liu, X., "Robust and secure time-synchronization against Sybil attacks for sensor networks", IEEE Trans. Ind. Inform. 2015, 11, 1482–1491.
  • Wang, Zeng, Kong, Li, Jin, "Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks", MDPI Sensors 2018, 18, 2718; doi:10.3390/s18082718
  • Zheng, N., "Resilient Consensus for Multi-Agent Systems in the Presence of Sybil Attacks", Electronics 2022, 11, 800. https://doi.org/10.3390/ electronics1105080.
  • Wu, Y.; Xu, M.; Zheng, N.; He, X. "Event-Triggered Resilient Consensus for Multi-Agent Networks Under Deception Attacks", IEEE Access 2020, 8, 78121–78129. How to cite this article:
  • Wang, D.; Zheng, N.; Xu, M.; Wu, Y.; Hu, Q.; Wang, G. "Resilient Privacy-Preserving Average Consensus for Multi-agent Systems under Attacks", In Proceedings of the 16th International Conference on Control, Automation, Robotics and Vision (ICARCV), Shenzhen, China, 13–15 December 2020; pp. 1399–1405
  • Jamshidi, M.; Darwesh, A.M.; Lorenc, A.; Ranjbari, M.; Meybodi, M.R, "A precise algorithm for detecting malicious sybil nodes in mobile wireless sensor networks", IEIE Trans. Smart Process. Comput. 2018, 7, 457–466
  • Wu, Y.; He, X., "Secure Consensus Control for Multi-Agent Systems with Attacks and Communication Delays", IEEE/CAA J. Autom.Sin. 2017, 4, 136–142.
  • He J, Cheng P, Shi L, Chen J. "SATS: secure average-consensus-based time synchronization in wireless sensor networks", IEEE Trans Signal Process. 2013;61(24):6387.
  • Panigrahi N, Khilar PM, "Optimal consensus-based clock synchronization algorithm in wireless sensor network by selective averaging", IET WirelSens Syst. 2015. https:// doi. org/ 10. 1049/ iet- wss. 2013. 0102(1stOctober 2014).
  • Pymote documentation, [30 December 2022].

Abstract Views: 107

PDF Views: 1




  • Resilient Consensus-Based Time Synchronization with Distributed Sybil Attack Detection Strategy for Wireless Sensor Networks: A Graph Theoretic Approach

Abstract Views: 107  |  PDF Views: 1

Authors

Suresh Kumar Jha
Department of Computer Science and Engineering, MBM University, Jodhpur, Rajasthan, India
Anil Gupta
Department of Computer Science and Engineering, MBM University, Jodhpur, Rajasthan, India
Niranjan Panigrahi
Department of Computer Science and Engineering, PMEC, Berhampur, Odisha, India

Abstract


Security attacks on time synchronization services prevent the Wireless Sensor Networks (WSNs) from operating consistently and possibly cause the system to go down entirely. One of the most vulnerable attack types where a node falsely assumes many identities is the Sybil attack. Despite receiving a lot of attention for their simplicity and distributed nature, consensus-based time synchronization (CTS) algorithms in WSN do not exhibit robust behavior when subjected to a Sybil attack. In this context, a message-level Sybil detection mechanism, the Sybil resilient consensus time synchronization protocol (SRCTS), is proposed using a graph-theoretic approach. A novel distributed mechanism based on connected component theory is proposed to detect and filter Sybil messages. The comparison has been shown with Robust and secure Time Synchronization Protocol (RTSP) and Node-identification-based secure time synchronization protocols (NiSTS) for detection and convergence speed. The Sybil message detection rate is improved by 6% as compared to SRCTS vs RTSP and by 14% as compared to SRCTS vs NiSTS. Simulation results exhibit that the SRCTS algorithm is 62% more effective as compared to NiSTS and 45% more efficient than RTSP in terms of convergence rate. An in-depth mathematical analysis is presented to prove the correctness of the algorithms, and the message complexity is proven to be O(n2). The algorithm is validated through extensive simulation results.

Keywords


Connected Components, Consensus-Based Time Synchronization (CTS), Graph Theory, Sybil Attack, Wireless Sensor Network, Message Graph, Conformance Property.

References





DOI: https://doi.org/10.22247/ijcna%2F2023%2F218510