On calibrating measurements of packet transit times
SIGMETRICS '98/PERFORMANCE '98 Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
The nesC language: A holistic approach to networked embedded systems
PLDI '03 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Remote Physical Device Fingerprinting
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Hot or not: revealing hidden services by their clock skew
Proceedings of the 13th ACM conference on Computer and communications security
PAST: Probabilistic Authentication of Sensor Timestamps
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
On fast and accurate detection of unauthorized wireless access points using clock skews
Proceedings of the 14th ACM international conference on Mobile computing and networking
An improved clock-skew measurement technique for revealing hidden services
SS'08 Proceedings of the 17th conference on Security symposium
Sundial: Using Sunlight to Reconstruct Global Timestamps
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
TinyOS Programming
On the reliability of wireless fingerprinting using clock skews
Proceedings of the third ACM conference on Wireless network security
Hi-index | 0.00 |
Clock skew, an inherent property of clock crystals of physical devices, is defined as the rate of deviation of a device clock from the true time. The frequency of a device's clock actually depends on its environment, such as the temperature, humidity, vibration, electromagnetic interference, as well as the type of crystal. The main contributions of this paper are twofold. First, we experimentally validate that MICAz and TelosB sensor motes have different and unique clock skews. Furthermore, the clock skew of a node can easily be monitored, even via a multi-hop Wireless Sensor Network (WSN). We argue that this feature can be used for identification of the nodes, detection of wormhole and Sybil attacks. Second, we show that the clock skew of a sensor node varies with the variation of temperature. We explain how this property can be used to detect malicious and malfunctioning nodes and to geolocalise them. We also discuss the pros and cons of utilisation of the above two properties for different services in WSNs.