Computer Science ›› 2017, Vol. 44 ›› Issue (3): 175-181.doi: 10.11896/j.issn.1002-137X.2017.03.038

Previous Articles     Next Articles

Design of Secure Multi-hop Time Synchronization Protocol for IEEE802.15.4e

YANG Wei, WANG Qin, WAN Ya-dong and HE Jie   

  • Online:2018-11-13 Published:2018-11-13

Abstract: IEEE802.15.4e is the latest MAC layer standards for the industrial Internet of things,which enables highly reliable and ultra-low power wireless networking through time synchronization technique.Because time synchronization is a core fundamental technology for industrial wireless network,it often becomes an attractive target for attac-kers.This paper proposed a secure multi-hop time synchronization mechanism called SMTSF for IEEE802.15.4e.SMTSF mainly adopt anomaly-based intrusion detection algorithm,multi-path approach based on trust modeling,encryption and authentication technologies to secure multi-hop time synchronization.In the process of anomaly-based intrusion detection algorithm,the border router nodes verify the rank value of other nodes in the network which can effectively detect time synchronization tree attack.A mini-firewall based on packet filtering can stop intrusion attempts from the Internet.The multi-path approach based on trust modeling can find a secure path to the root node by establishing trust model between nodes.Simulation experiments show that SMTSF can detect time synchronization tree attack and defend against compromise attack.

Key words: IEEE802.15.4e,Secure,Time synchronization,Industrial Internet of things

[1] INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro &Nanosystems,in co-operation with the Working Group RFID of the ETP EPOSS,Internet of Things in 2020,Roadmap for the Future[R].Version 1.1,2008.
[2] MIORANDI D,SICARI S,DE PELLEGRINI F,et al.Internet of things:Vision,applications and research challenges[J].Ad Hoc Networks,2012,10(7):1497-1516.
[3] ATZORI L,IERA A,MORABITO G.The Internet of Things:A survey[J].Computer Networks,2010,54:2787-2805.
[4] IEEE 802.15.4e-2012:IEEE Standard for Local and Metropolitan Area Networks-Part 15.4:Low-Rate Wireless Personal AreaNetworks (LR-WPANs) Amendment 1[S].New York:LAN/MAN Standards Committee,2012.
[5] KUSHALNAGAR N,MONTENEGRO G, SCHUMACHER C.IPv6over low-power wireless personal area networks (6LoWPANs):overview,assumptions,problem statement,and goals: RFC 4919[R].New York:Internet Engineering Task Force,2007.
[6] WINTER T,HUBERR P,BRANDT A,et al.RPL:IPv6 rou-tingprotocol for low-power and lossynetworks:RFC 6550[R].New York:Internet Engineering Task Force,2012.
[7] WATTEYNE T,LANZISERA S,MEHTA A,et al.Mitigating Multipath Fading through Channel Hopping in Wireless Sensor Networks[C]∥2010 IEEE International Conference on Communications (ICC).2010:1-5.
[8] DOHERTY L,LINDSAY W,SIMON J.Channel-specific wireless sensor network path data[C]∥Proceedings of 16th International Conference on Computer Communications and Networks,2007(ICCCN 2007).IEEE,2007:89-94.
[9] HUANG D J,TENG W C,YANG K T.Secured flooding time synchronization protocol with moderator[J].International Journal of Communication Systems,2013,26(9):1092-1115.
[10] YANG W,WANG Q,QI Y,et al.Time Synchronization Attacks in IEEE802.15.4 e Networks[C]∥2014 International Confe-rence on Identification,Information and Knowledge in the Internet of Things (IIKI).IEEE,2014:166-169.
[11] SUN K,NING P,WANG C.TinySeRSync:secure and resilient time synchronization in wireless sensor networks[C]∥Procee-dings of the 13th ACM Conference on Computer and Communications Security.ACM,2006:264-277.
[12] YIN X L,QI W D.LiteST:a lightweight secure time synchronization protocol for wireless sensor networks [J].Journal on Communations,2009,30(4):74-85.(in Chinese) 尹香兰,齐望东.LiteST:一种无线传感器网络轻量级安全时间同步协议[J].通信学报,2009,30(4):74-85.
[13] GANERIWAL S,PPPER C,CˇAPKUN S,et al.Secure time synchronization in sensor networks[J].ACM Transactions on Information and System Security (TISSEC),2008,11(4):23.
[14] THUBERT P,WATTEYNE T,PALATTELLA M R,et al.IETF 6TSCH:Combining IPv6 Connectivity with Industrial Performance[J].Seventh International Conference on Innovative Mobile & Internet Services in Ubiquitous Computing,2013,395(6):541-546.
[15] LUO J,LIU X,FAN M.A trust model based on fuzzy recommendation for mobile ad-hoc networks[J].Computer Networks,2009,53(14):2396-2407.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!