Time synchronization attack detection for industrial wireless network
High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
China InfoCom Media Group
2023-06-01
|
Series: | 物联网学报 |
Subjects: | |
Online Access: | http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2023.00334/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841533829893849088 |
---|---|
author | Sichao ZHANG Wei LIANG Xudong YUAN Yinlong ZHANG Meng ZHENG |
author_facet | Sichao ZHANG Wei LIANG Xudong YUAN Yinlong ZHANG Meng ZHENG |
author_sort | Sichao ZHANG |
collection | DOAJ |
description | High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise. |
format | Article |
id | doaj-art-936f1dd0f07b40bdb3ee0c41debdd531 |
institution | Kabale University |
issn | 2096-3750 |
language | zho |
publishDate | 2023-06-01 |
publisher | China InfoCom Media Group |
record_format | Article |
series | 物联网学报 |
spelling | doaj-art-936f1dd0f07b40bdb3ee0c41debdd5312025-01-15T02:54:32ZzhoChina InfoCom Media Group物联网学报2096-37502023-06-017889759578253Time synchronization attack detection for industrial wireless networkSichao ZHANGWei LIANGXudong YUANYinlong ZHANGMeng ZHENGHigh-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2023.00334/industrial wireless networktime synchronization attackdelay attackattack detectionBayesian model |
spellingShingle | Sichao ZHANG Wei LIANG Xudong YUAN Yinlong ZHANG Meng ZHENG Time synchronization attack detection for industrial wireless network 物联网学报 industrial wireless network time synchronization attack delay attack attack detection Bayesian model |
title | Time synchronization attack detection for industrial wireless network |
title_full | Time synchronization attack detection for industrial wireless network |
title_fullStr | Time synchronization attack detection for industrial wireless network |
title_full_unstemmed | Time synchronization attack detection for industrial wireless network |
title_short | Time synchronization attack detection for industrial wireless network |
title_sort | time synchronization attack detection for industrial wireless network |
topic | industrial wireless network time synchronization attack delay attack attack detection Bayesian model |
url | http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2023.00334/ |
work_keys_str_mv | AT sichaozhang timesynchronizationattackdetectionforindustrialwirelessnetwork AT weiliang timesynchronizationattackdetectionforindustrialwirelessnetwork AT xudongyuan timesynchronizationattackdetectionforindustrialwirelessnetwork AT yinlongzhang timesynchronizationattackdetectionforindustrialwirelessnetwork AT mengzheng timesynchronizationattackdetectionforindustrialwirelessnetwork |