Access control model based on time synchronization trust in wireless sensor networks

Zhaobin Liu, Qiang Ma, Wenzhi Liu, Victor S. Sheng, Liang Zhang, Gang Liu

Research output: Contribution to journalArticlepeer-review

5 Scopus citations


Internal reliability and external safety of Wireless Sensor Networks (WSN) data transmission have become increasingly outstanding issues with the wide applications of WSN. This paper proposes a new method for access control and mitigation of interfering noise in time synchronization environments. First, a formal definition is given regarding the impact interference noise has on the clock skew and clock offset of each node. The degree of node interference behavior is estimated dynamically from the perspective of time-stamp changes caused by the interference noise. Secondly, a general access control model is proposed to resist invasion of noise interference. A prediction model is constructed using the Bayesian method for calculating the reliability of neighbor node behavior in the proposed model. Interference noise, which attacks the time synchronization, is regarded as the key factor for probability estimation of the reliability. The result of the calculations determines whether it is necessary to initiate synchronization filtering. Finally, a division of trust levels with bilinear definition is employed to lower interference noise and improve the quality of interference detection. Experimental results show that this model has advantages in system overhead, energy consumption and testing errors, compared to its counterparts. When the disturbance intensity of a WSN increases, the proposed optimized algorithm converges faster with a lower network communication load.

Original languageEnglish
Article number2107
JournalSensors (Switzerland)
Issue number7
StatePublished - Jul 2018


  • Access control
  • Interference noise
  • Reliability
  • Time synchronization
  • Wireless sensor networks


Dive into the research topics of 'Access control model based on time synchronization trust in wireless sensor networks'. Together they form a unique fingerprint.

Cite this