Clock Synchronization in Sensor Networks for Civil Security Farnaz Moradi Asrin Javaheri.

Slides:



Advertisements
Similar presentations
Energy-efficient distributed algorithms for wireless ad hoc networks Ramki Gummadi (MIT)
Advertisements

Christoph Lenzen Philipp Sommer Philipp Sommer Roger Wattenhofer Roger Wattenhofer Optimal Clock Synchronization in Networks.
The Flooding Time Synchronization Protocol
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Gradient Clock Synchronization in Wireless Sensor Networks
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
HIERARCHY REFERENCING TIME SYNCHRONIZATION PROTOCOL Prepared by : Sunny Kr. Lohani, Roll – 16 Sem – 7, Dept. of Comp. Sc. & Engg.
Wireless Sensor Networks Clock Synchronization Professor Jack Stankovic University of Virginia.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
Introduction to Wireless Sensor Networks
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Impala: A Middleware System for Managing Autonomic, Parallel Sensor Systems Ting Liu and Margaret Martonosi Princeton University.
Sensor Network-Based Countersniper System Gyula S, Gyorgy B, Gabor P, Miklos M, Branislav K, Janos S, Akos L, Andras N, Ken F Presented by Vikram Reddy.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Security Issues In Sensor Networks By Priya Palanivelu.
He Huang Introduction:The Flooding Time Synchronization Protocol.
The Flooding Time Synchronization Protocol
Intrusion Detection System for Wireless Sensor Networks ABSTRACT Wireless sensor networks (WSNs) consist a set of small sensor devices. These devices are.
Time Synchronization Murat Demirbas SUNY Buffalo.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
8/18/2015 Mobile Ad hoc Networks COE 549 Synchronization Tarek Sheltami KFUPM CCSE COE 1.
Energy-Aware Synchronization in Wireless Sensor Networks Yanos Saravanos Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
CS2510 Fault Tolerance and Privacy in Wireless Sensor Networks partially based on presentation by Sameh Gobriel.
1 Y-MAC: An Energy-efficient Multi-channel MAC Protocol for Dense Wireless Sensor Networks Youngmin Kim, Hyojeong Shin, and Hojung Cha International Conference.
CS450 Network Embedded Sensing Systems Week 11: Time Synchronization and Reconstruction Jayant Gupchup.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Adaptive Control-Based Clock Synchronization in Wireless Sensor Networks Kasım Sinan YILDIRIM *, Ruggero CARLI +, Luca SCHENATO + * Department of Computer.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
On-Demand Traffic-Embedded Clock Synchronization for Wireless Sensor Networks Sang Hoon Lee.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Energy-Efficient Signal Processing and Communication Algorithms for Scalable Distributed Fusion.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
1 Clock Synchronization for Wireless Sensor Networks: A Survey Bharath Sundararaman, Ugo Buy, and Ajay D. Kshemkalyani Department of Computer Science University.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
Time synchronization for UWSN. Outline Time synchronization knowledge Typical time sync protocol Time sync in UWSN Discussion.
Fasika Assegei Segal’s Law A man with a watch knows what time it is. A man with two watches is never sure.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Fine-Grained Network Time Synchronization using Reference Broadcasts Jeremy Elson, Lew Girod, and Deborah Estrin OSDI Boston, MA Speaker : hsiwei-Chen.
Ad Hoc Network.
1 Segal’s Law A man with a watch knows what time it is. A man with two watches is never sure.
Time Synchronization Protocols in Wireless Sensor Networks.
Group Members Usman Nazir FA08-BET-179 M.Usman Saeed FA08-BET-173
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2,
Wireless Sensor Networks
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
INTRODUCTION TO WIRELESS SENSOR NETWORKS
Introduction to Wireless Sensor Networks
Research: algorithmic solutions for networking
Presentation by Andrew Keating for CS577 Fall 2009
Protocols.
An Overview of Security Issues in Sensor Network
A Distributed Clustering Scheme For Underwater Sensor Networks
Protocols.
Presentation transcript:

Clock Synchronization in Sensor Networks for Civil Security Farnaz Moradi Asrin Javaheri

Outline  Wireless sensor networks  Surveillance Applications  Clock synchronization  Synchronization algorithms  RBS  FTSP  Implementation  Performance Evaluation  Fault tolerance  Security  Demonstration  Conclusion

Wireless Sensor Networks  Consist a set of small sensor devices  Sensor nodes are deployed in an ad hoc fashion  Used for sensing a physical phenomenon  Communication using wireless radio channels  Nodes are constrained in memory, computational power, battery lifetime, …

Surveillance Applications  Transport Applications:  Airports, Harbours, Borders, Railways and Roadways  Public Places:  Banks, Supermarkets, Homes, Parking Lots, Hospitals, Bridges  Law Enforcement and Military:  Forensic Applications, Intrusion detection, Target tracking, Remote Surveillance  Environmental Monitoring:  Habitat Monitoring, Forrest Fire Monitoring

Surveillance Scenario

Clock and Time  System clock counts oscillations of a quartz crystal  Clock offset: difference between the time reported by a clock and the real time  Nodes started at different times  Clock Skew: difference in the frequencies of the clock and the perfect clock  Different frequency of the oscillators  Frequency change of the clocks over time due to temperature, aging, …

Why do we need Time Synchronization? “A man with a watch knows what time it is. A man with two watches is never sure.” -Segal’s Law  Time synchronization is a basic middleware service of wireless sensor networks  Time synchronization is required for:  Events with timestamps: Mobile object tracking  Ordering of collected sensor data/events  Delay measurements for distance/location estimation  TDMA radio scheduling  Detection of duplicate events  Coordination of wake-up and sleep times ( for energy efficiency )

Errors in Clock Synchronization 0 1 t= t= t=6 6 7 t= t= t=6 Result

Clock Synchronization Algorithms  Design approaches:  Leader-based clock synchronization  Reference broadcast clock synchronization  Averaging-based clock synchronization  Converge to max clock synchronization  …  Protocol classifications:  Continuous  On-demand (post-facto synchronization)  Trade-off between energy efficiency and fine-grained synchronization

Flooding Time Synchronization Protocol (FTSP)  Leader-based synchronization (sender-receiver)  MAC Layer time-stamping  Fine-grained time synchronization Receiver iReceiver jSender Synchronization Packet T—Timestamp Packet t2— Timestamp arrival t1—Packet arrival Calculate Global Time t2— Timestamp arrival t1—Packet arrival

Reference Broadcast Synchronization (RBS)  Receiver – Receiver based approach  Fine-grained time synchronization  Can be implemented in a distributed manner Receiver iReceiver jSender Beacon Packet t2—Packet reception interrupt t1—Packet arrival t3—Timestamp packet t2—Packet reception interrupt t1—Packet arrival t3—Timestamp packet Asynchronous Exchange of Timestamps

Implementation  MSB-430  Texas Instrument MSP430 microcontroller  Chipcon CC1020 transceiver  kHz quartz clock  4 nodes used for experiments in a single-hop network  Contiki Operating System  Hybrid model of even-driven systems and preemptive multi- threading systems (using proto-threads)  Rime communication stack  Designed for low-power radios wireless sensor networks

Experiments FTSP  Synchronizer node periodically broadcasts a message containing the global time  Other nodes timestamp message’s arrival  Nodes calculate their offset and skew with the synchronizer using least square linear regression  An external node periodically broadcasts a query message  All nodes report their estimated global time

Experiments RBS  Each node periodically broadcasts a beacon  Other nodes timestamp the beacon’s arrival  Receiver nodes exchange the stored beacon arrival time with each other  Each node calculates the offset and skew with every neighbor using linear regression  An external node broadcasts a query message  All nodes report their estimated global time

Performance Evaluation

Fault Tolerance  Nodes gets lost (Unattained environments)  Harsh environments  Batteries run out  Adversarial attacks (Sensor nodes can be physically captured or destroyed)  Important requirement for time synchronization services:  Robustness to node and communication failures

FTSP  No message collisions (in single-hop network)  Single point of failure  Synchronizer node  Distributed Leader Election  Designating a single node as the synchronizer  After start-up  In case of leader failure  Node with smallest ID will be selected as the leader  Guarantees that there will be only one leader in the network at any time

RBS  No single point of failure (completely distributed)  Message collision  Exchange messages (42~70%)  Collision Avoidance  Random back-off (19~38%)  TDMA-based scheduling (0~0.004% )  Nodes transmit one after the other using their dedicated time slot … BeaconSlot 1Slot 2Slot 3BeaconSlot 1Slot 2Slot 3Beacon… Round 1Round 2 …

Comparison Protocol Node Failure Tolerance Message Collision Overall Complexity Basic RBS (with one beacon sender) LowHighMedium RBS (with all nodes sending beacons) High RBS with random back-offHighMediumHigh RBS with TDMA using local timeHighLowHigh RBS with TDMA using global timeHighVery LowHigh Basic FTSPLowNoneLow FTSP with leader electionHighMedium

Security Threats to Time Synchronization  Main Goal: convincing nodes that their neighbours' clocks are at a different time than they actually are  Forging/modifying messages  Denial of Service  Pulse-delay attacks  Sybil attacks  Compromising nodes Time = 2 Time = 5 Delay… Replay message Modify message Jam signals Time = 5 I am node 3 Time = 10 I am node 6 Time = 4 ATTACK Time = x

Secure Clock Synchronization Algorithm  Secure synchronization protocol  Masks attacks by adversaries  Guarantees automatic recovery after arbitrary failures  Tolerates message collisions and message losses  Self-stabilizing algorithm for secure clock synchronization  Masks pulse-delay attacks in presence of captured nodes  Guarantees efficient communication overheads with high probability

Demonstration MSB-430 Core Module PIR Sensor Power Supply

Conclusion  Fine-grained clock synchronization is crucial for applications that depend on global notation of time  Surveillance applications: Target tracking, …  The required precision can be achieved by employing distributed approaches  Reference broadcast synchronization (RBS)  Synchronization should be robust and fault tolerance  Leader election to tolerate node failures  TDMA-based scheduling to tolerate message collisions  Attacks against clock synchronization can lead to erroneous application outputs  Secure and self-stabilizing synchronization

Future Work  Optimizing the period of sending synchronization messages  Comparing precision against the bandwidth used for synchronization messages and energy consumption  Extending the robust algorithms to larger networks  Testing the secure algorithm in presence of attacks  …

Thank You Questions