Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things

Time synchronisation is a fundamental requirement for the IEEE802.15.4e-based industrial Internet of Things, allowing it to reach low-power and high-reliability wireless network through time synchronisation. If malicious adversaries launch time synchronisation attacks to IEEE802.15.4e-based networks, the entire network communication will be paralysed. In this study, the authors introduce two types of time synchronisation attacks: (i) absolute slot number (ASN) and (ii) timeslot template attack. In ASN attack, the new nodes may receive an incorrect ASN value, which prevents synchronisation with the typical network, while in the timeslot template attack, the malicious node can make the legitimate nodes calculate the error clock offset. The authors propose an enhanced secure time synchronisation protocol to defend against these attacks, which include Sec_ASN and TOF algorithm. The Sec_ASN and threshold filter (TOF) algorithms are used to defend against ASN attack and timeslot template attacks, respectively. Finally, the authors run a thorough set of simulations to assess the effectiveness of the proposed attacks as well as the proposed countermeasure. The results show that the attacks can significantly destroy the time synchronisation protocol, but can be successfully defended using the proposed mechanisms.

References

    1. 1)
      • 12. Huang, D.J., Teng, W.C., Yang, K.T.: ‘Secured flooding time synchronization protocol with moderator’, Int. J. Commun. Syst., 2013, 26, (9), pp. 10921115.
    2. 2)
      • 8. Bormann, C., Castellani, A.P., Shelby, Z.: ‘CoAP: An application protocol for billions of tiny internet nodes’, IEEE Internet Comput., 2012, 16, (2), pp. 6267.
    3. 3)
      • 6. IETF: ‘IPv6 over low-power wireless personal area networks (6LoW-PANs): overview, assumptions, problem statement, and goals’ (N. Kushalnagar, G. Montenegro, and C. Schumacher, 2007), pp. 112.
    4. 4)
      • 15. Dong, W., Liu, X.: ‘Robust and secure time-synchronization against sybil attacks for sensor networks’, IEEE Trans. Ind. Inf., 2015, 11, (6), pp. 14821491.
    5. 5)
      • 11. H.A.R.T Communication Foundation: ‘WirelessHART Speciication 75: TDMA Data-Link Layer’, 2008.
    6. 6)
      • 2. Chi, Q., Yan, H., Zhang, C., et al: ‘A reconfigurable smart sensor interface for industrial WSN in IoT environment’, IEEE Trans. Ind. Inf., 2014, 10, (2), pp. 14171425.
    7. 7)
      • 7. IETF: ‘RPL: IPv6 routing protocol for low-power and lossy networks’ (T. Winter, P. Thubert, A. Brandt, 2012), pp. 120.
    8. 8)
      • 5. IEEE Standard for Local and Metropolitan Area Networks-Part 15.4: ‘Low-rate wireless personal area networks (LR-WPANs) amendment 1: MAC Sublayer, IEEE Standard 802.15.4e-2012’, 2012.
    9. 9)
      • 13. He, J., Chen, J., Cheng, P., et al: ‘Secure time synchronization in wireless sensor networks: a maximum consensus-based approach’, IEEE Trans. Parallel Distrib. Syst., 2014, 25, (4), pp. 10551065.
    10. 10)
      • 10. International Society of Automation (ISA): ‘ISA-100.11a-2011: Wireless systems for industrial automation: process control and related applications’, 2011.
    11. 11)
      • 9. Stanislowski, D., Vilajosana, X., Wang, Q., et al: ‘Adaptive synchronization in IEEE802.15.4e networks’, IEEE Trans. Ind. Inf., 2014, 10, (1), pp. 795802.
    12. 12)
      • 4. Dujovne, D., Watteyne, T., Vilajosana, X., et al: ‘6TiSCH: deterministic IP-enabled industrial internet (of things)’, IEEE Commun. Mag., 2014, 52, (12), pp. 3641.
    13. 13)
      • 18. Watteyne, T., Vilajosana, X., Kerkez, B., et al: ‘OpenWSN: a standards-based low-power wireless development environment’, Trans. Emerg. Telecommun. Technol., 2012, 23, (5), pp. 480493.
    14. 14)
      • 19. Phung, K.H., Lemmens, B., Goossens, M., et al: ‘Schedule-based multi-channel communication in wireless sensor networks: a complete design and performance evaluation’, Ad Hoc Netw., 2015, 26, (3), pp. 88102.
    15. 15)
      • 14. Ganeriwal, S., Pöpper, C., Čapkun, S., et al: ‘Secure time synchronization in sensor networks’, ACM Trans. Inf. Syst. Secur., 2008, 11, (4), pp. 2357.
    16. 16)
      • 17. Islam, K., Shen, W., Wang, X.: ‘Wireless sensor network reliability and security in factory automation: a survey’, IEEE Trans. Syst. Man Cybern C, 2012, 42, (6), pp. 12431256.
    17. 17)
      • 3. Palattella, M.R., Accettura, N., Grieco, L.A., et al: ‘On optimal scheduling in duty-cycled industrial IoT applications using IEEE802. 15.4 e TSCH’, IEEE Sens. J., 2013, 13, (10), pp. 36553666.
    18. 18)
      • 1. Da Xu, L., He, W., Li, S.: ‘Internet of things in industries: a survey’, IEEE Trans. Ind. Inf., 2014, 10, (4), pp. 22332243.
    19. 19)
      • 16. Sun, K., Ning, P., Wang, C.: ‘TinySeRSync: secure and resilient time synchronization in wireless sensor networks’. Proc. Int. Conf. Computer and Communications Security, Virginia, USA, October 2006, pp. 264277.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2016.0232
Loading

Related content

content/journals/10.1049/iet-ifs.2016.0232
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address