• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Wei, He Jie, Wan Yadong, Wang Qin, Li Chong. Security Countermeasures for Time Synchronization in IEEE802.15.4e-Based Industrial IoT[J]. Journal of Computer Research and Development, 2017, 54(9): 2032-2043. DOI: 10.7544/issn1000-1239.2017.20160636
Citation: Yang Wei, He Jie, Wan Yadong, Wang Qin, Li Chong. Security Countermeasures for Time Synchronization in IEEE802.15.4e-Based Industrial IoT[J]. Journal of Computer Research and Development, 2017, 54(9): 2032-2043. DOI: 10.7544/issn1000-1239.2017.20160636

Security Countermeasures for Time Synchronization in IEEE802.15.4e-Based Industrial IoT

More Information
  • Published Date: August 31, 2017
  • IEEE802.15.4e is the latest MAC layer standards for the industrial Internet of things, which enables highly reliable and ultra-low power wireless networking through time synchronization technique. In cyberspace where an adversary may attack the networks through various ways, time synchronization becomes an attractive target due to its importance. If an adversary launches time synchronization attack, it will paralyze the whole network communication, the node localization and data fusion application. However, the time synchronization protocol is not insufficient to be protected in IEEE802.15.4e standard. So it is crucial to design a secure time synchronization protocol. First, we develop a secure single-hop ASN synchronization and a secure single-hop device-to-device synchronization using hardware-assisted encryption and authentication. And we also adopt the 2s+1 method and threshold filter algorithm. Second, we develop a secure multi-hop time synchronization mechanism which adopts a rank-based intrusion detection algorithm. Third, theoretical analysis and experiments show that the proposed countermeasures can successfully defend against external attacks and insider attacks, as well as high clock accurate and low power consumption.
  • Related Articles

    [1]Qian Zhongsheng, Huang Heng, Zhu Hui, Liu Jinping. Multi-Perspective Graph Contrastive Learning Recommendation Method with Layer Attention Mechanism[J]. Journal of Computer Research and Development, 2025, 62(1): 160-178. DOI: 10.7544/issn1000-1239.202330804
    [2]Song Chuanming, Min Xin, Xie Weidong, Yin Baocai, Wang Xianghai. Elastic Motion Estimation Algorithm Using Two-Bit-Depth Pixels[J]. Journal of Computer Research and Development, 2019, 56(11): 2469-2484. DOI: 10.7544/issn1000-1239.2019.20180699
    [3]Wu Yihan, Huang Gang, Zhang Ying, Xiong Yingfei. A Model-Based Fault Tolerance Mechanism Development Approach for Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(1): 138-154. DOI: 10.7544/issn1000-1239.2016.20150608
    [4]Zhu Xia, Song Aibo, Dong Fang, Luo Junzhou. A Collaborative Filtering Recommendation Mechanism for Cloud Computing[J]. Journal of Computer Research and Development, 2014, 51(10): 2255-2269. DOI: 10.7544/issn1000-1239.2014.20130056
    [5]Lin Hui, Ma Jianfeng, Xu Li. A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism[J]. Journal of Computer Research and Development, 2014, 51(7): 1486-1496.
    [6]Lü Xiaobo, Guo Yao, and Chen Xiangqun. A Splitting-Based Cloud Storage Mechanism for Digital Images[J]. Journal of Computer Research and Development, 2014, 51(5): 1129-1135.
    [7]Yu Leilei, Chen Dongyan, Liu Yuemei, Huang Xu. Centralized-Calculating-Based 2-Disjoint Multipath Routing Algorithm for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(3): 517-523.
    [8]Gao Jianmin, Lu Huimei, and Cao Yuanda. Multi-Source Interactive Application Layer Multicast Routing Protocol[J]. Journal of Computer Research and Development, 2011, 48(5): 778-785.
    [9]Hu Ning, Zou Peng, and Zhu Peidong. A Cooperative Mechanism for Inter-Domain Routing Management[J]. Journal of Computer Research and Development, 2009, 46(8): 1251-1259.
    [10]Shen Qingni, Qing Sihan, and Li Liping. Design and Implementation of a Multi-Layered Privilege Control Mechanism[J]. Journal of Computer Research and Development, 2006, 43(3): 423-428.

Catalog

    Article views PDF downloads Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return