Security cooperation model based on topology control and time synchronization for wireless sensor networks

Zhaobin Liu, Wenzhi Liu, Qiang Ma, Gang Liu, Liang Zhang, Ligang Fang, Victor S. Sheng

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

To address malicious attacks generated from wireless sensor networks (WSNs), in this paper, we study the difficulty of detecting uncoordinated behavior by using a model that is unreliable and has uncontrollable accuracy, trustless control, and an inextensible protocol. A security collaboration model involving coupled state vectors associated with topology control and time synchronization is proposed. The networks achieve synchronization using weights and by controlling the number of goals. The simple calculation of time synchronization values between neighboring nodes serves as the basis for judging the behavior of the node topology control. The coupling state vector calculation is the core of the model. The topology coupling strength rate, signal intensity reduction, clock drift, and clock delay are combined to form a comprehensive model. The network energy consumption is reduced by updating the coupling state vector regularly. The coupling cooperation threshold is set to make security decisions and effectively distinguish between attack nodes and dead nodes. Thus, to ensure the security and reliability of the network, we present a security cooperation collection tree protocol (SC-CTP) scheme that maintains a trusted environment and isolates misbehaving nodes. The simulation results show that the model can detect malicious nodes effectively, has a high detection rate, and greatly reduces the energy consumption of the whole network. In order to verify the effectiveness of the proposed model, a large-scale wireless sensor network with 200 nodes was deployed on a campus. The proposed model was applied to optimize the deployment of key nodes on the campus. Furthermore, a candidate set of these nodes were selected to achieve coupling cooperation of key goals. This test verified the reliability of the model, its customizable accuracy, and the reliability of the control.

Original languageEnglish
Article number8796507
Pages (from-to)469-480
Number of pages12
JournalJournal of Communications and Networks
Volume21
Issue number5
DOIs
StatePublished - Oct 2019

Keywords

  • Security cooperation model
  • WSNs
  • time synchronization
  • topology control

Fingerprint

Dive into the research topics of 'Security cooperation model based on topology control and time synchronization for wireless sensor networks'. Together they form a unique fingerprint.

Cite this