计算机科学 ›› 2017, Vol. 44 ›› Issue (3): 175-181.doi: 10.11896/j.issn.1002-137X.2017.03.038

• 信息安全 • 上一篇    下一篇

IEEE802.15.4e 标准的安全多跳时间同步协议设计

杨伟,王沁,万亚东,何杰   

  1. 北京科技大学计算机与通信工程学院 北京100083,北京科技大学计算机与通信工程学院 北京100083,北京科技大学计算机与通信工程学院 北京100083,北京科技大学计算机与通信工程学院 北京100083
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家“八六三”高技术研究发展计划基金项目(2014AA041801-2),360开放实验室课题资助

Design of Secure Multi-hop Time Synchronization Protocol for IEEE802.15.4e

YANG Wei, WANG Qin, WAN Ya-dong and HE Jie   

  • Online:2018-11-13 Published:2018-11-13

摘要: IEEE802.15.4e是工业物联网中最新的MAC层标准,其采用时间同步技术实现高可靠、低功耗的无线网络。由于时间同步机制是工业无线网络中的核心支撑技术,因此其往往成为攻击者的首选攻击目标。针对IEEE802.15.4e标准的多跳时间同步协议存在安全性不足的问题,提出了一个多跳时间同步安全策略 SMTSF。SMTSF 安全策略主要采用基于异常的入侵检测算法、基于信任模型的多路径时间同步方法和加密与认证等关键技术,有效保障了节点之间安全地进行多跳时间同步。在基于入侵检测的算法中,边界路由器对节点的 Rank 值进行规则验证,可以有效检测出时间同步树攻击;同时设计了轻量级防火墙来抵御来自互联网的恶意主机攻击。在基于信任模型的多路径时间同步方法中,通过建立节点之间的信任模型来保障网络中节点可以找到一条安全多跳同步路径。仿真结果表明,SMTSF 能有效检测时间同步树攻击并抵御捕获攻击。

关键词: IEEE802.15.4e,安全,时间同步,工业物联网

Abstract: IEEE802.15.4e is the latest MAC layer standards for the industrial Internet of things,which enables highly reliable and ultra-low power wireless networking through time synchronization technique.Because time synchronization is a core fundamental technology for industrial wireless network,it often becomes an attractive target for attac-kers.This paper proposed a secure multi-hop time synchronization mechanism called SMTSF for IEEE802.15.4e.SMTSF mainly adopt anomaly-based intrusion detection algorithm,multi-path approach based on trust modeling,encryption and authentication technologies to secure multi-hop time synchronization.In the process of anomaly-based intrusion detection algorithm,the border router nodes verify the rank value of other nodes in the network which can effectively detect time synchronization tree attack.A mini-firewall based on packet filtering can stop intrusion attempts from the Internet.The multi-path approach based on trust modeling can find a secure path to the root node by establishing trust model between nodes.Simulation experiments show that SMTSF can detect time synchronization tree attack and defend against compromise attack.

Key words: IEEE802.15.4e,Secure,Time synchronization,Industrial Internet of things

[1] INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro &Nanosystems,in co-operation with the Working Group RFID of the ETP EPOSS,Internet of Things in 2020,Roadmap for the Future[R].Version 1.1,2008.
[2] MIORANDI D,SICARI S,DE PELLEGRINI F,et al.Internet of things:Vision,applications and research challenges[J].Ad Hoc Networks,2012,10(7):1497-1516.
[3] ATZORI L,IERA A,MORABITO G.The Internet of Things:A survey[J].Computer Networks,2010,54:2787-2805.
[4] IEEE 802.15.4e-2012:IEEE Standard for Local and Metropolitan Area Networks-Part 15.4:Low-Rate Wireless Personal AreaNetworks (LR-WPANs) Amendment 1[S].New York:LAN/MAN Standards Committee,2012.
[5] KUSHALNAGAR N,MONTENEGRO G, SCHUMACHER C.IPv6over low-power wireless personal area networks (6LoWPANs):overview,assumptions,problem statement,and goals: RFC 4919[R].New York:Internet Engineering Task Force,2007.
[6] WINTER T,HUBERR P,BRANDT A,et al.RPL:IPv6 rou-tingprotocol for low-power and lossynetworks:RFC 6550[R].New York:Internet Engineering Task Force,2012.
[7] WATTEYNE T,LANZISERA S,MEHTA A,et al.Mitigating Multipath Fading through Channel Hopping in Wireless Sensor Networks[C]∥2010 IEEE International Conference on Communications (ICC).2010:1-5.
[8] DOHERTY L,LINDSAY W,SIMON J.Channel-specific wireless sensor network path data[C]∥Proceedings of 16th International Conference on Computer Communications and Networks,2007(ICCCN 2007).IEEE,2007:89-94.
[9] HUANG D J,TENG W C,YANG K T.Secured flooding time synchronization protocol with moderator[J].International Journal of Communication Systems,2013,26(9):1092-1115.
[10] YANG W,WANG Q,QI Y,et al.Time Synchronization Attacks in IEEE802.15.4 e Networks[C]∥2014 International Confe-rence on Identification,Information and Knowledge in the Internet of Things (IIKI).IEEE,2014:166-169.
[11] SUN K,NING P,WANG C.TinySeRSync:secure and resilient time synchronization in wireless sensor networks[C]∥Procee-dings of the 13th ACM Conference on Computer and Communications Security.ACM,2006:264-277.
[12] YIN X L,QI W D.LiteST:a lightweight secure time synchronization protocol for wireless sensor networks [J].Journal on Communations,2009,30(4):74-85.(in Chinese) 尹香兰,齐望东.LiteST:一种无线传感器网络轻量级安全时间同步协议[J].通信学报,2009,30(4):74-85.
[13] GANERIWAL S,PPPER C,CˇAPKUN S,et al.Secure time synchronization in sensor networks[J].ACM Transactions on Information and System Security (TISSEC),2008,11(4):23.
[14] THUBERT P,WATTEYNE T,PALATTELLA M R,et al.IETF 6TSCH:Combining IPv6 Connectivity with Industrial Performance[J].Seventh International Conference on Innovative Mobile & Internet Services in Ubiquitous Computing,2013,395(6):541-546.
[15] LUO J,LIU X,FAN M.A trust model based on fuzzy recommendation for mobile ad-hoc networks[J].Computer Networks,2009,53(14):2396-2407.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!