International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Resilient Consensus-Based Time Synchronization with Distributed Sybil Attack Detection Strategy for Wireless Sensor Networks: A Graph Theoretic Approach

Author NameAuthor Details

Suresh Kumar Jha, Anil Gupta, Niranjan Panigrahi

Suresh Kumar Jha[1]

Anil Gupta[2]

Niranjan Panigrahi[3]

[1]Department of Computer Science and Engineering, MBM University, Jodhpur, Rajasthan, India

[2]Department of Computer Science and Engineering, MBM University, Jodhpur, Rajasthan, India

[3]Department of Computer Science and Engineering, PMEC, Berhampur, Odisha, India

Abstract

Security attacks on time synchronization services prevent the Wireless Sensor Networks (WSNs) from operating consistently and possibly cause the system to go down entirely. One of the most vulnerable attack types where a node falsely assumes many identities is the Sybil attack. Despite receiving a lot of attention for their simplicity and distributed nature, consensus-based time synchronization (CTS) algorithms in WSN do not exhibit robust behavior when subjected to a Sybil attack. In this context, a message-level Sybil detection mechanism, the Sybil resilient consensus time synchronization protocol (SRCTS), is proposed using a graph-theoretic approach. A novel distributed mechanism based on connected component theory is proposed to detect and filter Sybil messages. The comparison has been shown with Robust and secure Time Synchronization Protocol (RTSP) and Node-identification-based secure time synchronization protocols (NiSTS) for detection and convergence speed. The Sybil message detection rate is improved by 6% as compared to SRCTS vs RTSP and by 14% as compared to SRCTS vs NiSTS. Simulation results exhibit that the SRCTS algorithm is 62% more effective as compared to NiSTS and 45% more efficient than RTSP in terms of convergence rate. An in-depth mathematical analysis is presented to prove the correctness of the algorithms, and the message complexity is proven to be O(n2). The algorithm is validated through extensive simulation results.

Index Terms

Connected Components

Consensus-Based Time Synchronization (CTS)

Graph Theory

Sybil Attack

Wireless Sensor Network

Message Graph

Conformance Property

Reference

  1. 1.
    Zhang Xuxin , Liu Yanzhang& Zhang Ya , "A Secure Clock Synchronization Scheme for Wireless Sensor Networks Against Malicious Attacks", Journal of Systems Science and Complexity volume 34,https://doi.org/10.1007/s11424-021-0002-y, pages 2125–2138, 04 February 2021.
  2. 2.
    Kobo, H.I.; Abu-Mahfouz, A.M.; Hancke, G.P,"A survey on software-defined wireless sensor networks: Challenges and design requirements". IEEE Access 2017, 5, 1872–1899
  3. 3.
    Du Shengli, Wang Y, Dong L, "Secure consensus of multiagent systems with DoS attacks via a graph-based approach", https://doi.org/10.1016/j.ins.2021.03.0540020-0255, Elsevier 2021
  4. 4.
    Wang, Z.; Zeng, P.; Zhou, M.; Li, D.; Wang, J. "Cluster-based maximum consensus time synchronization for industrial wireless sensor networks". Sensors 2017, 17, 141.
  5. 5.
    Hansdah, R.C.; Swain, A.R. "A model for the classification and survey of clock synchronization protocols in WSNs". Ad Hoc Network. 2015, 27, 219–241.
  6. 6.
    Schenato, L.; Fiorentin, “Average TimeSynch: A consensus-based protocol for clock synchronization in wireless sensor networks”. Automatica 2011, 47, 1878–1886
  7. 7.
    Sarvghadi, M.A.; Wan, T.C. "Message Passing Based Time Synchronization in Wireless Sensor Networks: A Survey". Int. J. Distrib. Sens. Netw. 2016, 12, 1280904.
  8. 8.
    Ganeriwal, P.; Kumar, P.; Srivastava, M.B. "Timing-sync protocol for sensor networks". In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, USA, 5–7 November 2013; pp. 138–149.
  9. 9.
    Yildirim, K.S.; Kantarci, A.,"Time synchronization based on slow-flooding in wireless sensor networks".IEEE Trans. Parallel Distrib. Syst. 2014, 25, 244–253
  10. 10.
    Alsaedi, N.; Hashim, F.; Sali, A.; Rokhani, F.Z., "Detecting Sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)". Comput. Commun. 2017, 110, 75–82.
  11. 11.
    Wu Yiming, "Secure Consensus Control for Multi-Agent Systems with Attacks and Communication Delays", CAA Journal of Automatica Sinica • January 2017, DOI: 10.1109/JAS.2016.7510010
  12. 12.
    Ganeriwal, S.; Han, C.C.; Srivastava, M.B. "Secure time synchronization service for sensor networks". In Proceedings of the 4th ACM Workshop on Wireless Security, Cologne, Germany, 2 September 2005; pp. 97–106.
  13. 13.
    Rahman, M.; El-Khatib, K. "Secure time synchronization for wireless sensor networks based on bilinear pairing functions". IEEE Trans. Parallel. Distrib. Syst. 2010.
  14. 14.
    Hu, X.; Park, T.; Shin, K.G., "Attack-tolerant time-synchronization in wireless sensor networks". In Proceedings of the 27th Conference on Computer Communications (IEEE INFOCOM), Phoenix, AZ, USA, 13–18 April 2008; pp. 41–45.
  15. 15.
    He, J.; Cheng, P.; Shi, L.; Chen, J., "SATS: Secure average-consensus-based time synchronization in wireless sensor networks". IEEE Trans. Signal Process. 2013, 61, 6387–6400.
  16. 16.
    Dong, W.; Liu, X., "Robust and secure time-synchronization against Sybil attacks for sensor networks", IEEE Trans. Ind. Inform. 2015, 11, 1482–1491.
  17. 17.
    Wang, Zeng, Kong, Li, Jin, "Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks", MDPI Sensors 2018, 18, 2718; doi:10.3390/s18082718
  18. 18.
    Zheng, N., "Resilient Consensus for Multi-Agent Systems in the Presence of Sybil Attacks", Electronics 2022, 11, 800. https://doi.org/10.3390/ electronics1105080.
  19. 19.
    Wu, Y.; Xu, M.; Zheng, N.; He, X. "Event-Triggered Resilient Consensus for Multi-Agent Networks Under Deception Attacks", IEEE Access 2020, 8, 78121–78129.
  20. 20.
    Wang, D.; Zheng, N.; Xu, M.; Wu, Y.; Hu, Q.; Wang, G. "Resilient Privacy-Preserving Average Consensus for Multi-agent Systems under Attacks", In Proceedings of the 16th International Conference on Control, Automation, Robotics and Vision (ICARCV), Shenzhen, China, 13–15 December 2020; pp. 1399–1405
  21. 21.
    Jamshidi, M.; Darwesh, A.M.; Lorenc, A.; Ranjbari, M.; Meybodi, M.R, "A precise algorithm for detecting malicious sybil nodes in mobile wireless sensor networks", IEIE Trans. Smart Process. Comput. 2018, 7, 457–466
  22. 22.
    Wu, Y.; He, X., "Secure Consensus Control for Multi-Agent Systems with Attacks and Communication Delays", IEEE/CAA J. Autom.Sin. 2017, 4, 136–142.
  23. 23.
    He J, Cheng P, Shi L, Chen J. "SATS: secure average-consensus-based time synchronization in wireless sensor networks", IEEE Trans Signal Process. 2013;61(24):6387.
  24. 24.
    Panigrahi N, Khilar PM, "Optimal consensus-based clock synchronization algorithm in wireless sensor network by selective averaging", IET WirelSens Syst. 2015. https:// doi. org/ 10. 1049/ iet- wss. 2013. 0102(1stOctober 2014).
  25. 25.
    Pymote documentation, [30 December 2022].
SCOPUS
SCImago Journal & Country Rank