Security Cooperation Model Based on Topology Control and Time Synchronization for Wireless Sensor Networks.

Zhaobin Liu,Wenzhi Liu,Qiang Ma,Gang Liu,Liang Zhang,Ligang Fang,Victor S. Sheng
DOI: https://doi.org/10.1109/jcn.2019.000041
2019-01-01
Journal of Communications and Networks
Abstract:To address malicious attacks generated from wireless sensor networks (WSNs), in this paper, we study the difficulty of detecting uncoordinated behavior by using a model that is unreliable and has uncontrollable accuracy, trustless control, and an inextensible protocol. A security collaboration model involving coupled state vectors associated with topology control and time synchronization is proposed. The networks achieve synchronization using weights and by controlling the number of goals. The simple calculation of time synchronization values between neighboring nodes serves as the basis for judging the behavior of the node topology control. The coupling state vector calculation is the core of the model. The topology coupling strength rate, signal intensity reduction, clock drift, and clock delay are combined to form a comprehensive model. The network energy consumption is reduced by updating the coupling state vector regularly. The coupling cooperation threshold is set to make security decisions and effectively distinguish between attack nodes and dead nodes. Thus, to ensure the security and reliability of the network, we present a security cooperation collection tree protocol (SC-CTP) scheme that maintains a trusted environment and isolates misbehaving nodes. The simulation results show that the model can detect malicious nodes effectively, has a high detection rate, and greatly reduces the energy consumption of the whole network. In order to verify the effectiveness of the proposed model, a large-scale wireless sensor network with 200 nodes was deployed on a campus. The proposed model was applied to optimize the deployment of key nodes on the campus. Furthermore, a candidate set of these nodes were selected to achieve coupling cooperation of key goals. This test verified the reliability of the model, its customizable accuracy, and the reliability of the control.
What problem does this paper attempt to address?