• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Wei, He Jie, Wan Yadong, Wang Qin, Li Chong. Security Countermeasures for Time Synchronization in IEEE802.15.4e-Based Industrial IoT[J]. Journal of Computer Research and Development, 2017, 54(9): 2032-2043. DOI: 10.7544/issn1000-1239.2017.20160636
Citation: Yang Wei, He Jie, Wan Yadong, Wang Qin, Li Chong. Security Countermeasures for Time Synchronization in IEEE802.15.4e-Based Industrial IoT[J]. Journal of Computer Research and Development, 2017, 54(9): 2032-2043. DOI: 10.7544/issn1000-1239.2017.20160636

Security Countermeasures for Time Synchronization in IEEE802.15.4e-Based Industrial IoT

More Information
  • Published Date: August 31, 2017
  • IEEE802.15.4e is the latest MAC layer standards for the industrial Internet of things, which enables highly reliable and ultra-low power wireless networking through time synchronization technique. In cyberspace where an adversary may attack the networks through various ways, time synchronization becomes an attractive target due to its importance. If an adversary launches time synchronization attack, it will paralyze the whole network communication, the node localization and data fusion application. However, the time synchronization protocol is not insufficient to be protected in IEEE802.15.4e standard. So it is crucial to design a secure time synchronization protocol. First, we develop a secure single-hop ASN synchronization and a secure single-hop device-to-device synchronization using hardware-assisted encryption and authentication. And we also adopt the 2s+1 method and threshold filter algorithm. Second, we develop a secure multi-hop time synchronization mechanism which adopts a rank-based intrusion detection algorithm. Third, theoretical analysis and experiments show that the proposed countermeasures can successfully defend against external attacks and insider attacks, as well as high clock accurate and low power consumption.
  • Related Articles

    [1]Wang Yuwei, Liu Min, Ma Cheng, Li Pengfei. High Performance Load Balancing Mechanism for Network Function Virtualization[J]. Journal of Computer Research and Development, 2018, 55(4): 689-703. DOI: 10.7544/issn1000-1239.2018.20170923
    [2]Chen Qi, Chen Zuoning, Jiang Jinhu. MDDS: A Method to Improve the Metadata Performance of Parallel File System for HPC[J]. Journal of Computer Research and Development, 2014, 51(8): 1663-1670. DOI: 10.7544/issn1000-1239.2014.20121094
    [3]Wang Peng, Huang Yan, Li Kun, Guo Youming. Load Balancing Degree First Algorithm on Phase Space for Cloud Computing Cluster[J]. Journal of Computer Research and Development, 2014, 51(5): 1095-1107.
    [4]Shen Zhijun, Zeng Huashen. A Load Balanced Switch Architecture Based on Implicit Flow Splitter[J]. Journal of Computer Research and Development, 2012, 49(6): 1220-1227.
    [5]Liu Xinhua, Li Fangmin, Kuang Hailan, Fang Yilin. An Distributed and Directed Clustering Algorithm Based on Load Balance for Wireless Sensor Network[J]. Journal of Computer Research and Development, 2009, 46(12): 2044-2052.
    [6]Liu Ying, Wang Qirong, Sun Ninghui. Study of Loading Strategy in Shared-Nothing Event Stream Parallel Database Systems[J]. Journal of Computer Research and Development, 2009, 46(1): 159-166.
    [7]Wang Xianghui, Zhang Guoyin, and Xie Xiaoqin. A Load Balance Clustering Algorithm for Multilevel Energy Heterogeneous Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(3): 392-399.
    [8]Li Zhenyu, Xie Gaogang. A Load Balancing Algorithm for DHT-Based P2P Systems[J]. Journal of Computer Research and Development, 2006, 43(9): 1579-1585.
    [9]Tian Junfeng, Liu Yuling, and Du Ruizhong. Research of a Load Balancing Model Based on Mobile Agent[J]. Journal of Computer Research and Development, 2006, 43(9): 1571-1578.
    [10]Zhang Xiangquan, Guo Wei. A Bidirectional Path Re-Selection Based Load-Balanced Routing Protocol for Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2006, 43(2): 218-223.

Catalog

    Article views (1560) PDF downloads (770) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return