{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:55:52Z","timestamp":1763348152900,"version":"build-2065373602"},"reference-count":35,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2018,8,18]],"date-time":"2018-08-18T00:00:00Z","timestamp":1534550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61533015, 61502474"],"award-info":[{"award-number":["61533015, 61502474"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["-"],"award-info":[{"award-number":["-"]}],"id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Time synchronization is critical for wireless sensors networks in industrial automation, e.g., event detection and process control of industrial plants and equipment need a common time reference. However, cyber-physical attacks are enormous threats causing synchronization protocols to fail. This paper studies the algorithm design and analysis in secure time synchronization for resource-constrained industrial wireless sensor networks under Sybil attacks, which cannot be well addressed by existing methods. A node-identification-based secure time synchronization (NiSTS) protocol is proposed. The main idea of this protocol is to utilize the timestamp correlation among different nodes and the uniqueness of a node\u2019s clock skew to detect invalid information rather than isolating suspicious nodes. In the detection process, each node takes the relative skew with respect to its public neighbor as the basis to determine whether the information is reliable and to filter invalid information. The information filtering mechanism renders NiSTS resistant to Sybil attacks and message manipulation attacks. As a completely distributed protocol, NiSTS is not sensitive to the number of Sybil attackers. Extensive simulations were conducted to demonstrate the efficiency of NiSTS and compare it with existing protocols.<\/jats:p>","DOI":"10.3390\/s18082718","type":"journal-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T11:23:06Z","timestamp":1534764186000},"page":"2718","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7797-3316","authenticated-orcid":false,"given":"Zhaowei","family":"Wang","sequence":"first","affiliation":[{"name":"Key Laboratory of Networked Control System, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China"},{"name":"University of Chinese Academy of Sciences, Beijing 100049, China"}]},{"given":"Peng","family":"Zeng","sequence":"additional","affiliation":[{"name":"Key Laboratory of Networked Control System, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China"}]},{"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"}]},{"given":"Dong","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of Networked Control System, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3570-7463","authenticated-orcid":false,"given":"Xi","family":"Jin","sequence":"additional","affiliation":[{"name":"Key Laboratory of Networked Control System, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,8,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1872","DOI":"10.1109\/ACCESS.2017.2666200","article-title":"A survey on software-defined wireless sensor networks: Challenges and design requirements","volume":"5","author":"Kobo","year":"2017","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of things in industries: A survey","volume":"10","author":"He","year":"2014","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1109\/SURV.2014.012114.00058","article-title":"An industrial perspective on wireless sensor networks\u2014A survey of requirements, protocols, and challenges","volume":"16","author":"Ovsthus","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zeng, P., Zhou, M., Li, D., and Wang, J. (2017). Cluster-based maximum consensus time synchronization for industrial wireless sensor networks. Sensors, 17.","DOI":"10.3390\/s17010141"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.adhoc.2014.11.021","article-title":"A model for the classification and survey of clock synchronization protocols in WSNs","volume":"27","author":"Hansdah","year":"2015","journal-title":"Ad Hoc Netw."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2269","DOI":"10.1109\/JSEN.2011.2182045","article-title":"Consensus clock synchronization for wireless sensor networks","volume":"12","author":"Maggs","year":"2012","journal-title":"IEEE Sens. J."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ganeriwal, P., Kumar, P., and Srivastava, M.B. (2003, January 5\u20137). Timing-sync protocol for sensor networks. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, USA.","DOI":"10.1145\/958491.958508"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Maroti, M., Kusy, B., Simon, G., and Ledeczi, A. (2004, January 3\u20135). The flooding time synchronization protocol. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys), Baltimore, MD, USA.","DOI":"10.1145\/1031495.1031501"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1109\/TPDS.2013.58","article-title":"External gradient time synchronization in wireless sensor networks","volume":"25","author":"Yildirim","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/TPDS.2013.40","article-title":"Time synchronization based on slow-flooding in wireless sensor networks","volume":"25","author":"Yildirim","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Sommer, P., and Wattenhofer, R. (2009, January 13\u201316). Gradient clock synchronization in wireless sensor networks. Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, San Francisco, CA, USA.","DOI":"10.1145\/1435473.1435477"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1878","DOI":"10.1016\/j.automatica.2011.06.012","article-title":"Average timesynch: A consensus-based protocol for clock synchronization in wireless sensor networks","volume":"47","author":"Schenato","year":"2011","journal-title":"Automatica"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/TAC.2013.2286893","article-title":"Time synchronization in WSNs: A maximum-value-based consensus approach","volume":"59","author":"He","year":"2014","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1404","DOI":"10.1109\/JSEN.2014.2363471","article-title":"Cluster-based consensus time synchronization for wireless sensor networks","volume":"15","author":"Wu","year":"2015","journal-title":"IEEE Sens. J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MWC.2007.4396944","article-title":"Secure time synchronization protocols for wireless sensor networks","volume":"14","author":"Boukerche","year":"2007","journal-title":"IEEE Wirel. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/COMST.2008.4625802","article-title":"Securing wireless sensor networks: A survey","volume":"10","author":"Zhou","year":"2008","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_17","first-page":"5313","article-title":"Physical-layer security and reliability challenges for industrial wireless sensor networks","volume":"5","author":"Zhu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2387","DOI":"10.1109\/TVT.2007.912327","article-title":"Secure and efficient time synchronization in heterogeneous sensor networks","volume":"57","author":"Du","year":"2008","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_19","unstructured":"Song, H., Zhu, S., and Cao, G. (2005, January 7). Attack-resilient time synchronization for wireless sensor networks. Proceedings of the 2005 IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, USA."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1055","DOI":"10.1109\/TPDS.2013.150","article-title":"Secure time synchronization in wireless sensor networks: A maximum consensus-based approach","volume":"25","author":"He","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"6387","DOI":"10.1109\/TSP.2013.2286102","article-title":"SATS: Secure average-consensus-based time synchronization in wireless sensor networks","volume":"61","author":"He","year":"2013","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.1109\/TII.2015.2495147","article-title":"Robust and secure time-synchronization against sybil attacks for sensor networks","volume":"11","author":"Dong","year":"2015","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"798","DOI":"10.1002\/wcm.1144","article-title":"Random time source protocol in wireless sensor networks and synchronization in industrial environments","volume":"13","author":"Wang","year":"2013","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., and Perrig, A. (2004, January 27). The sybil attack in sensor networks: Analysis & defenses. Proceedings of the Third International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA.","DOI":"10.1145\/984622.984660"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.comcom.2017.05.006","article-title":"Detecting Sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)","volume":"110","author":"Alsaedi","year":"2017","journal-title":"Comput. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3042","DOI":"10.1016\/j.comnet.2009.07.013","article-title":"Detecting Sybil attacks in Wireless Sensor Networks using neighboring information","volume":"53","author":"Ssu","year":"2009","journal-title":"Comput. Netw."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Benzaid, C., Saiah, A., and Badache, N. (2011, January 27\u201329). Secure pairwise broadcast time synchronization in wireless sensor networks. Proceedings of the 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), Barcelona, Spain.","DOI":"10.1109\/DCOSS.2011.5982217"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Huang, D.-J., Teng, W.-C., Wang, C.-Y., Huang, H.-Y., and Hellerstein, J.M. (December, January 30). Clock skew based node identification in wireless sensor networks. Proceedings of the 2008 IEEE Global Telecommunications Conference (IEEE GLOBECOM), New Orleans, LA, USA.","DOI":"10.1109\/GLOCOM.2008.ECP.363"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/JSAC.2005.861396","article-title":"Secure and resilient clock synchronization in wireless sensor networks","volume":"24","author":"Sun","year":"2006","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_30","unstructured":"Sun, K., Ning, P., and Wang, C. (November, January 30). TinySeRSync: Secure and resilient time synchronization in wireless sensor networks. Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS \u201906), Alexandria, VA, USA."},{"key":"ref_31","unstructured":"Rahman, M., and El-Khatib, K. (2010). Secure time synchronization for wireless sensor networks based on bilinear pairing functions. IEEE Trans. Parallel. Distrib. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Han, C.C., and Srivastava, M.B. (2005, January 2). Secure time synchronization service for sensor networks. Proceedings of the 4th ACM Workshop on Wireless Security, Cologne, Germany.","DOI":"10.1145\/1080793.1080809"},{"key":"ref_33","unstructured":"Roosta, T., and Sastry, S. (2007). Securing Flooding Time Synchronization Protocol in Sensor Networks, University of California. Technical Report."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1109\/TDSC.2005.36","article-title":"Fault-tolerant cluster-wise clock synchronization for wireless sensor networks","volume":"2","author":"Sun","year":"2005","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Hu, X., Park, T., and Shin, K.G. (2008, January 13\u201318). Attack-tolerant time-synchronization in wireless sensor networks. Proceedings of the 27th Conference on Computer Communications (IEEE INFOCOM), Phoenix, AZ, USA.","DOI":"10.1109\/INFOCOM.2008.17"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/8\/2718\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:19:30Z","timestamp":1760195970000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/8\/2718"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,18]]},"references-count":35,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,8]]}},"alternative-id":["s18082718"],"URL":"https:\/\/doi.org\/10.3390\/s18082718","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,8,18]]}}}