CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Time Synchronization Protocol in Wireless Sensor Network based on Hash Code

by Sachin Umrao, Arun Kumar Tripathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 23
Year of Publication: 2013
Authors: Sachin Umrao, Arun Kumar Tripathi
10.5120/11721-7411

Sachin Umrao, Arun Kumar Tripathi . Time Synchronization Protocol in Wireless Sensor Network based on Hash Code. International Journal of Computer Applications. 68, 23 ( April 2013), 31-35. DOI=10.5120/11721-7411

@article{ 10.5120/11721-7411,
author = { Sachin Umrao, Arun Kumar Tripathi },
title = { Time Synchronization Protocol in Wireless Sensor Network based on Hash Code },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 23 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number23/11721-7411/ },
doi = { 10.5120/11721-7411 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:28:43.023929+05:30
%A Sachin Umrao
%A Arun Kumar Tripathi
%T Time Synchronization Protocol in Wireless Sensor Network based on Hash Code
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 23
%P 31-35
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In current time peoples are switching from wired network to wireless network. This is great achievement for technology. Peoples are using wireless networks, but there is main problem which arises in wireless network is security. Many researches are involved in this field. Wireless sensor networks (WSN) have achieved a lot of consideration recently due to wide range of research applications such as target tracking, environment monitoring, and scientific exploration in dodgy environments. Each sensor node in WSN contains a local clock, required for time synchronization. Time synchronization is a significant module of sensor networks to grant a common clock time in sensor nodes. Some sensor nodes may be harmful, which can disturb the normal function of a sensor network. In this paper, main focus is to uncover malicious nodes and propose time synchronization protocol based on hash code.

References
  1. Mukherjee, B. , Ghosal, D. , Yick, J. : Wireless sensor network survey. Computer Network 52(12), 2292–2330 (2008)
  2. Kshemkalyani, A. D. , Sundararaman, B. , Buy, U. : Clock synchronization for wireless sensor networks. A Survey on Ad-hoc Networks, 281–323 (2005)
  3. Capkunl, S. , Ganeriwal, S. , Han, S. , Srivastava, M. : Securing Timing Synchronization in Sensor Networks. In: Proceedings of, pp. 369–390. Springer, New York (2006)
  4. Cayirci, E. , Akyildiz, I. F. , Su, W. , Sankarasubramaniam, Y. : A Survey on Sensor Networks. IEEE Communications Magazine, 102–114 (2002)
  5. Kopetz, H. , Ochsenreiter, W. : Clock Synchronization in Distributed Real-Time Systems. IEEE Transactions on Computers 36(8), 933–940 (1987)
  6. Li, H. , Chen, K. , Wen, M. , Zheng, Y. : A Secure Time Synchronization Protocol for Sensor Network. In: Washio, T. , Zhou, Z. -H. , Huang, J. Z. , Hu, X. , Li, J. , Xie, C. , He, J. , Zou, D. , Li, K. -C. , Freire, M. M. (eds. ) PAKDD 2007. LNCS (LNAI), vol. 4819, pp. 515–526. Springer, Heidelberg (2007)
  7. Wang, C. , Ning, P. , Sun, K. : Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2), 395–408 (2006)
  8. Song, H. , Zhu, G. C. S. : Attack-resilient time synchronization for wireless sensor networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, p. 772 (2005)
  9. Estrin, D. , Elson, J. , Girod, L. : Fine-grained network time synchronization using reference broadcasts. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation Special Issue, Boston, pp. 147–163 (2002)
  10. Trappe, W. , Xu. , W. , Zhang, Y. , Wood, T. : The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana Champaign, IL, USA, pp. 46–57 (2005)
  11. Ping, S. : Delay Measurement Time Synchronization for Wireless Sensor Networks, Intel Corporation, Intel Research, Berkeley (2002)
  12. Srivastava, M. B. , Kumar, R. , Ganeriwal, S. : Timing-sync protocol for sensor Networks. In: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems, Los Angeles, CA, pp. 138–149 (2003)
  13. Manzo, M. , Roosta, T. , Sastry, S. : Time synchronization attacks in sensor networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 107–116 (2005)
  14. Ganeriwal, S. , Popper, C. , Capkun, S. , Srivastava, M. B. : Secure Time Synchronization in Sensor Networks. ACM Transactions on Information and System Security, Article No: 23, 11(4) (2008)
  15. Jajodia, S. , Setia, S. , Zhu, S. : LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington DC. , USA, pp. 62–72 (2003)
  16. Simon, G. , Kusy, B. , Ledeczi Maroti, M. : A Clock synchronization for wireless sensor networks: A Survey. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 30–49 (2004)
  17. Hu, H. , Atakli, I. M. , Chen, Y. , Ku, W. -S. , Su, Z. : Malicious Node Detection in Wireless Sensor Networks. In: The Symposium on Simulation of Systems Security, pp. 836–843 (2008)
  18. Eschenauer, L. , Gligor, V. D. : A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 41–47 (2002)
  19. Chan, H. , Perrig, A. , Song, D. : Random key predistribution scheme for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197 (2003)
  20. Hwang, J. , Kim, Y. : Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, USA, pp. 43–52 (2004)
  21. Rong Peng : Angle of Arrival Localization for Wireless Sensor Networks : Sensor and Ad Hoc Communications and Networks, 2006. SECON '06. 2006 3rd Annual IEEE Communications Society on 28 Sept. 2006 p. p. - 374 - 382
Index Terms

Computer Science
Information Sciences

Keywords

Sensor Networks Security Time Synchronization Malicious nodes