Abstract

Internal reliability and external safety of Wireless Sensor Networks (WSN) data transmission have become increasingly outstanding issues with the wide applications of WSN. This paper proposes a new method for access control and mitigation of interfering noise in time synchronization environments. First, a formal definition is given regarding the impact interference noise has on the clock skew and clock offset of each node. The degree of node interference behavior is estimated dynamically from the perspective of time-stamp changes caused by the interference noise. Secondly, a general access control model is proposed to resist invasion of noise interference. A prediction model is constructed using the Bayesian method for calculating the reliability of neighbor node behavior in the proposed model. Interference noise, which attacks the time synchronization, is regarded as the key factor for probability estimation of the reliability. The result of the calculations determines whether it is necessary to initiate synchronization filtering. Finally, a division of trust levels with bilinear definition is employed to lower interference noise and improve the quality of interference detection. Experimental results show that this model has advantages in system overhead, energy consumption and testing errors, compared to its counterparts. When the disturbance intensity of a WSN increases, the proposed optimized algorithm converges faster with a lower network communication load.

Highlights

  • IntroductionInternal reliability of Wireless Sensor Networks (WSN) data transmission refers to random packet losses or error packets in a wireless link caused by topological changes, dynamic links, human disturbance or packet collisions [1,2], resulting in a failure to ensure the reliability and efficiency of data transmission

  • Internal reliability of Wireless Sensor Networks (WSN) data transmission refers to random packet losses or error packets in a wireless link caused by topological changes, dynamic links, human disturbance or packet collisions [1,2], resulting in a failure to ensure the reliability and efficiency of data transmission.External safety means some safety threats like latent invasions and attacks, including safety threats and attacks caused by passive wiretapping, data tampering and retransmission, falsification of identity, denial of service, node capture and so on, which might affect the integrity, confidentiality, authentication and serviceability of data

  • To improve the safety and fairness in the access control of WSN and, in consideration of the limitations of WSN resources, this paper proposed a WSN access control model CEACM-TS, based on time synchronization with the adoption of a light weight principle and a thought regarding testing

Read more

Summary

Introduction

Internal reliability of WSN data transmission refers to random packet losses or error packets in a wireless link caused by topological changes, dynamic links, human disturbance or packet collisions [1,2], resulting in a failure to ensure the reliability and efficiency of data transmission. Tolerant Time Synchronization Protocol (FTTSP) judges and detects the internal noise of the node based on the difference between the estimated value of the transmission time and the actual value by with fault-tolerance mechanism [10]. Solution based on group signature provides protection privacy for access control in wireless sensor networks [11]. A Bayesian method is used to study WSN access control through defining time synchronization states of nodes and the spatial correlation between time synchronizations of different nodes [17]. Taking the time correlation of WSN nodes and the shortage of WSN resources into consideration, adopting the principle of light weight, this paper puts forward a method to estimate the reliability degree between nodes based on a time synchronization access control model through analyzing the feasibility degree of disturbance noise and the time synchronization of nodes

Clock Model
Noise Detection
Time Synchronization Trust Relationship
Access Control Model
Algorithm Design
Performance Analysis and Experimental Results
System Cost
Energy Consumption Evaluation
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call