Secure and Self-Stabilizing Clock Synchronization in Clock Synchronization in Sensor Netw orks
Jaap-Henk Hoepman Andreas Larsson Jaap-Henk Hoepman, Andreas Larsson Elad M. Schiller, Philippas Tsigas 13 November 2007
Secure and Self-Stabilizing Clock Synchronization in Clock - - PowerPoint PPT Presentation
Secure and Self-Stabilizing Clock Synchronization in Clock Synchronization in Sensor Netw orks Jaap-Henk Hoepman Andreas Larsson Jaap-Henk Hoepman, Andreas Larsson Elad M. Schiller, Philippas Tsigas 13 November 2007 Wireless Sensor Netw orks
Jaap-Henk Hoepman Andreas Larsson Jaap-Henk Hoepman, Andreas Larsson Elad M. Schiller, Philippas Tsigas 13 November 2007
1 2 3 4 5 6 6 7 8 9 10 11 12 1 7 1 2 3 4 5 6 3 4 5 6 7 8 9 3 6 1 2 3 4 5 6 1 2 3 4 5 6 5 5
Motivation Implementation
Attacks Correctness Correctness Earlier work
Conclusion
Pinpointing events geographically Time division message scheduling
Radio shutoff periods Certain mathematical functions Certain mathematical functions …
R lt f t diti l t l Result of traditional protocols Required result
Much more powerful than the nodes
Capturing nodes and impersonating
Dealing with transient faults Security needs self-stabilization
Fault tolerance
Fault tolerance – message loss
Collisions
Motivation Implementation
Attacks Correctness Correctness Earlier work
Conclusion
Offset is arbitrary Rate, ρ, is varying
Clock rate stays within a certain interval
Clock rate stays within a certain interval
max min
D A C B C B
R1 R1 R2 R2 R2
Clock adjustments [Römer et al. 05] Policy for accuracy and energy budget Beacon scheduling Filtering out delays [Song et al. 06] j [ ] Beacon scheduling Beacon scheduling No self-stabilizing implementation exists Beacon scheduling Secure communication primitives [Sun et al. 06]
Ai R0 Rn Ri-1 Ri+1 … …
B A R1 R1 R1 R2 A B R2
Ai R0 Rn Ri-1 Ri+1 … … Ai R0 Rn Ri-1 Ri+1 … …
1
… … Ai R0 Rn Ri-1 Ri+1 … …
Q-1
… … Ai R0 Rn Ri-1 Ri+1 … …
Q
Data held by a node
Delivery to upper layer is delayed
Motivation Implementation
Attacks Correctness Correctness Earlier work
Conclusion
Interception of messages
Capturing nodes
p
R1 R1 R1 R2 R2
Cryptography does not help Nonce does not help
D A D A C B
Locally calculate delay Filter out over delayed beacons Filter out over-delayed beacons
Impersonated nodes send misleading data
Filter out misleading beacons
y g [ ]
Motivation Implementation
Attacks Correctness Correctness Earlier work
Conclusion
Beacon scheduler
Probabilistic delivery guarantees
receives
Every node receives a response to its beacon from every node
Beacon aggregation (appears in TR)
Motivation Implementation
Attacks Correctness Correctness Earlier work
Conclusion
[Herman and Zhang 06]
th t th t h i t bili i
A single captured node attack
At any time introduce the maximal clock value
Adversary sends the clock “far into the future”
e e t g a co t uous t e app o at o u ct o
No existing secure and self-stabilizing
M i l i i i i i l l k
synchronization prior to the first pulse-delay attack
The adversary can risk detection and The adversary can risk detection and
[Sun et al. 05] cluster-wise
configuration
We make no assumptions on
[Manzo et al. 05]
t t
the effect of captured nodes
captures nodes after the core selection
We make no assumption regarding the
[Farrugia and Simon 06]
values propagate for global clock synchronization values propagate for global clock synchronization
[Sun et al. 06]
[Sun et al. 06]
against an attack that compromises source nodes
We use no source nodes
Motivation Implementation
Attacks Correctness Correctness Earlier work
Conclusion
System settings of traditional networks
Designer assumptions
Self-stabilization can provide self-