A Novel Secure Pairwise and Groupwise Synchronizing Scheme in WSN

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 219)


Existing solutions yet for time synchronization in sensor networks are not resilient to malicious behavior from external attackers or internally compromised nodes. The feasibility of a pulse-delay attack (external attack), whereby an attacker can introduce arbitrarily long delays in the packet propagation time directly can affect the achieved synchronization precision. It is assumed in the proposed approach that all nodes are directly connected to one another. Hence, propagation delay is minimal. The proposed approach is able to overcome from external as well as internal attacker problems in group synchronization. The external attacks are resolved with the help of message authentication codes (MAC) and the use of private keys and internal attacks are found out on the basis of send and receive time. Once the group is secure from external as well as internal attacker i.e., no malicious node is present in the group then each node synchronizes to the common clock in the group.


Wireless sensor networks Time synchronization Malicious nodes 


  1. 1.
    Mukherjee B, Ghosal D, Yick J (2008) Wireless sensor network survey. Comput Netw 52(12):2292–2330CrossRefGoogle Scholar
  2. 2.
    Kshemkalyani AD, Sundararaman B, Buy U (2005) Clock synchronization for wireless sensor networks. Surv Ad-hoc Netw 63(24):281–323Google Scholar
  3. 3.
    Li H, Chen K, Wen M, Zheng Y (2007) A secure time synchronization protocol for sensor network. In: Emerging technologies in knowledge discovery and data mining, PAKDD 2007 international workshops nanjing, China, vol 38(23). pp 515–526 Google Scholar
  4. 4.
    Wang C, Ning P, Sun K (2006) Secure and resilient clock synchronization in wireless sensor networks. IEEE J Sel Areas Commun 24(2):395–408Google Scholar
  5. 5.
    Song H, Cao G, Zhu S (2005) Attack-resilient time synchronization for wireless sensor networks. In: IEEE international conference on mobile Adhoc and sensor systems conference, vol 13(6). pp 772–786Google Scholar
  6. 6.
    Estrin D, Elson J, Girod L (2002) Fine-grained network time synchronization using reference broadcasts. In: Proceedings of the 5th symposium on operating systems design and implementation SPECIAL ISSUE Boston, vol 73(49). pp 147–163Google Scholar
  7. 7.
    Srivastava MB, Kumar R, Ganeriwal S (2003) Timing-sync protocol for sensor Networks. In: Proceedings of the first ACM conference on embedded networked sensor systems, vol 52(21). Los Angeles, pp 138–149Google Scholar
  8. 8.
    Ganeriwal S, Popper C, Capkun S, Srivastava MB (2008) Secure time synchronization in sensor networks. ACM Trans Inf Syst Secur 11(4):15–23CrossRefGoogle Scholar
  9. 9.
    Simon G, Kusy B, Ledeczi MM (2004) A clock synchronization for wireless sensor networks: a survey. In: Proceedings of the 2nd international conference on embedded networked sensor systems, vol 15(6). pp 30–49Google Scholar
  10. 10.
    Capkunl S, Ganeriwal S, Han S, srivastava M (2006) Securing timing synchronization in sensor networks. In: Proceedings of Springer-Verlag New York, Inc USA, vol 34(11). pp 369–390Google Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Yancheng Institute of TechnologyYanchengChina

Personalised recommendations