{"title":"基于弹性共识的无线传感器网络时间同步分布式Sybil攻击检测策略:一种图论方法","authors":"S. K. Jha, Anil Gupta, Niranjan Panigrahi","doi":"10.22247/ijcna/2023/218510","DOIUrl":null,"url":null,"abstract":"– Security attacks on time synchronization services prevent the Wireless Sensor Networks (WSNs) from operating consistently and possibly cause the system to go down entirely. One of the most vulnerable attack types where a node falsely assumes many identities is the Sybil attack. Despite receiving a lot of attention for their simplicity and distributed nature, consensus-based time synchronization (CTS) algorithms in WSN do not exhibit robust behavior when subjected to a Sybil attack. In this context, a message-level Sybil detection mechanism, the Sybil resilient consensus time synchronization protocol (SRCTS), is proposed using a graph-theoretic approach. A novel distributed mechanism based on connected component theory is proposed to detect and filter Sybil messages. The comparison has been shown with Robust and secure Time Synchronization Protocol (RTSP) and Node-identification-based secure time synchronization protocols (NiSTS) for detection and convergence speed. The Sybil message detection rate is improved by 6% as compared to SRCTS vs RTSP and by 14% as compared to SRCTS vs NiSTS. Simulation results exhibit that the SRCTS algorithm is 62% more effective as compared to NiSTS and 45% more efficient than RTSP in terms of convergence rate. An in-depth mathematical analysis is presented to prove the correctness of the algorithms, and the message complexity is proven to be O(n 2 ). The algorithm is validated through extensive simulation results.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Resilient Consensus-Based Time Synchronization with Distributed Sybil Attack Detection Strategy for Wireless Sensor Networks: A Graph Theoretic Approach\",\"authors\":\"S. K. Jha, Anil Gupta, Niranjan Panigrahi\",\"doi\":\"10.22247/ijcna/2023/218510\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"– Security attacks on time synchronization services prevent the Wireless Sensor Networks (WSNs) from operating consistently and possibly cause the system to go down entirely. One of the most vulnerable attack types where a node falsely assumes many identities is the Sybil attack. Despite receiving a lot of attention for their simplicity and distributed nature, consensus-based time synchronization (CTS) algorithms in WSN do not exhibit robust behavior when subjected to a Sybil attack. In this context, a message-level Sybil detection mechanism, the Sybil resilient consensus time synchronization protocol (SRCTS), is proposed using a graph-theoretic approach. A novel distributed mechanism based on connected component theory is proposed to detect and filter Sybil messages. The comparison has been shown with Robust and secure Time Synchronization Protocol (RTSP) and Node-identification-based secure time synchronization protocols (NiSTS) for detection and convergence speed. The Sybil message detection rate is improved by 6% as compared to SRCTS vs RTSP and by 14% as compared to SRCTS vs NiSTS. Simulation results exhibit that the SRCTS algorithm is 62% more effective as compared to NiSTS and 45% more efficient than RTSP in terms of convergence rate. An in-depth mathematical analysis is presented to prove the correctness of the algorithms, and the message complexity is proven to be O(n 2 ). The algorithm is validated through extensive simulation results.\",\"PeriodicalId\":36485,\"journal\":{\"name\":\"International Journal of Computer Networks and Applications\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computer Networks and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22247/ijcna/2023/218510\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Networks and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22247/ijcna/2023/218510","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
Resilient Consensus-Based Time Synchronization with Distributed Sybil Attack Detection Strategy for Wireless Sensor Networks: A Graph Theoretic Approach
– Security attacks on time synchronization services prevent the Wireless Sensor Networks (WSNs) from operating consistently and possibly cause the system to go down entirely. One of the most vulnerable attack types where a node falsely assumes many identities is the Sybil attack. Despite receiving a lot of attention for their simplicity and distributed nature, consensus-based time synchronization (CTS) algorithms in WSN do not exhibit robust behavior when subjected to a Sybil attack. In this context, a message-level Sybil detection mechanism, the Sybil resilient consensus time synchronization protocol (SRCTS), is proposed using a graph-theoretic approach. A novel distributed mechanism based on connected component theory is proposed to detect and filter Sybil messages. The comparison has been shown with Robust and secure Time Synchronization Protocol (RTSP) and Node-identification-based secure time synchronization protocols (NiSTS) for detection and convergence speed. The Sybil message detection rate is improved by 6% as compared to SRCTS vs RTSP and by 14% as compared to SRCTS vs NiSTS. Simulation results exhibit that the SRCTS algorithm is 62% more effective as compared to NiSTS and 45% more efficient than RTSP in terms of convergence rate. An in-depth mathematical analysis is presented to prove the correctness of the algorithms, and the message complexity is proven to be O(n 2 ). The algorithm is validated through extensive simulation results.