1,368 research outputs found

    Attack Resilient Pulse Based Synchronization

    Get PDF
    Synchronization of pulse-coupled oscillators (PCOs) has gained significant attention recently due to increased applications in sensor networks and wireless communications. However, most existing results are obtained in the absence of malicious attacks. Given the distributed and unattended nature of wireless sensor networks, it is imperative to enhance the resilience of pulse-based synchronization against malicious attacks. To achieve this goal, we first show that by using a carefully designed phase response function (PRF), pulse-based synchronization of PCOs can be guaranteed despite the presence of a stealthy Byzantine attacker, even when legitimate PCOs have different initial phases. Next, we propose a new pulse-based synchronization mechanism to improve the resilience of pulse-based synchronization to multiple stealthy Byzantine attackers. We rigorously characterize the condition for mounting stealthy Byzantine attacks under the proposed new pulse-based synchronization mechanism and prove analytically that synchronization of legitimate oscillators can be achieved even when their initial phases are unrestricted, i.e., randomly distributed in the entire oscillation period. Since most existing results on resilient pulse-based synchronization are obtained only for all-to-all networks, we also propose a new pulse-based synchronization mechanism to improve the resilience of pulse-based synchronization that is applicable under general connected topologies. Under the proposed synchronization mechanism, we prove that synchronization of general connected legitimate PCOs can be guaranteed in the presence of multiple stealthy Byzantine attackers, irrespective of whether the attackers collude with each other or not. The new mechanism can guarantee resilient synchronization even when the initial phases of legitimate oscillators are distributed in a half circle. Then, to relax the limitation of the stealthy attacker model and the constraint on the legitimate oscillators\u27 initial phase distribution, we improved our synchronization mechanism and proved that finite time synchronization of legitimate oscillators can be guaranteed in the presence of multiple Byzantine attackers who can emit attack pulses arbitrarily without any constraint except that practical bit rate constraint renders the number of pulses from an attacker to be finite. The improved mechanism can guarantee synchronization even when the initial phases of all legitimate oscillators are arbitrarily distributed in the entire oscillation period. The new attack resilient pulse-based synchronization approaches in this dissertation are in distinct difference from most existing attack-resilient synchronization algorithms (including the seminal paper from Lamport and Melliar-Smith [1]) which require a priori (almost) synchronization among all legitimate nodes. Numerical simulations are given to confirm the theoretical results

    Assessing the impact of Byzantine attacks on coupled phase oscillators

    Full text link
    For many coupled dynamical systems, the interaction is the outcome of the measurement that each unit has of the others or of physical flows e.g. modern inverter-based power grids, autonomous vehicular platoons or swarms of drones. Synchronization among all the components of these systems is of primal importance to avoid failures. The overall operational state of these systems therefore crucially depends on the correct and reliable functioning of the individual elements as well as the information they transmit through the network. Here we investigate the effect of Byzantine attacks where one unit does not behave as expected, but is controlled by an external attacker. For such attacks, we assess the impact on the global collective behavior of nonlinearly coupled phase oscillators. We relate the synchronization error induced by the input signal to the properties of the attacked node. This allows to anticipate the potential of an attacker and identify which network components to secure.Comment: 6 pages, 5 figure

    Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator

    Get PDF
    The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without considering the security elements which may cause malfunctioning and cyber-attacks. This study extended the experiments by testing the method in the presence of denial-of-service (DoS) attacks to investigate the efficiency of EEPCO in attack-based networks. The result shows EEPCO has poor performance in the presence of DoS attacks in terms of data gathering and energy efficiency, which then concludes that the EEPCO is vulnerable in attack-based networks

    Nanosecond-Level Resilient GNSS-Based Time Synchronization in Telecommunication Networks Through WR-PTP HA

    Get PDF
    In recent years, the push for accurate and reliable time synchronization has gained momentum in critical infrastructures, especially in telecommunication networks, driven by the demands of 5G new radio and next-generation technologies that rely on submicrosecond timing accuracy for radio access network (RAN) nodes. Traditionally, atomic clocks paired with global navigation satellite systems (GNSS) timing receivers have served as grand master clocks, supported by dedicated network timing protocols. However, this approach struggles to scale with the increasing numbers of RAN intermediate nodes. To address scalability and high-accuracy synchronization, a more cost-effective and capillary solution is needed. Standalone GNSS timing receivers leverage ubiquitous satellite signals to offer stable timing signals but can expose networks to radio-frequency attacks due to the consequent proliferation of GNSS antennas. Our research introduces a solution by combining the white rabbit precise time protocol with a backup timing source logic acting in case of timing disruptive attacks against GNSS for resilient GNSS-based network synchronization. It has been rigorously tested against common jamming, meaconing, and spoofing attacks, consistently maintaining 2 ns relative synchronization accuracy between nodes, all without the need for an atomic clock

    Wireless Sensor Data Transport, Aggregation and Security

    Get PDF
    abstract: Wireless sensor networks (WSN) and the communication and the security therein have been gaining further prominence in the tech-industry recently, with the emergence of the so called Internet of Things (IoT). The steps from acquiring data and making a reactive decision base on the acquired sensor measurements are complex and requires careful execution of several steps. In many of these steps there are still technological gaps to fill that are due to the fact that several primitives that are desirable in a sensor network environment are bolt on the networks as application layer functionalities, rather than built in them. For several important functionalities that are at the core of IoT architectures we have developed a solution that is analyzed and discussed in the following chapters. The chain of steps from the acquisition of sensor samples until these samples reach a control center or the cloud where the data analytics are performed, starts with the acquisition of the sensor measurements at the correct time and, importantly, synchronously among all sensors deployed. This synchronization has to be network wide, including both the wired core network as well as the wireless edge devices. This thesis studies a decentralized and lightweight solution to synchronize and schedule IoT devices over wireless and wired networks adaptively, with very simple local signaling. Furthermore, measurement results have to be transported and aggregated over the same interface, requiring clever coordination among all nodes, as network resources are shared, keeping scalability and fail-safe operation in mind. Furthermore ensuring the integrity of measurements is a complicated task. On the one hand Cryptography can shield the network from outside attackers and therefore is the first step to take, but due to the volume of sensors must rely on an automated key distribution mechanism. On the other hand cryptography does not protect against exposed keys or inside attackers. One however can exploit statistical properties to detect and identify nodes that send false information and exclude these attacker nodes from the network to avoid data manipulation. Furthermore, if data is supplied by a third party, one can apply automated trust metric for each individual data source to define which data to accept and consider for mentioned statistical tests in the first place. Monitoring the cyber and physical activities of an IoT infrastructure in concert is another topic that is investigated in this thesis.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201
    • …
    corecore