Abstract
Secure time synchronization is one of the key concerns for Underwater Wireless Sensor Networks (UWSNs). This paper presents a CLUster-based Secure Synchronization (CLUSS) protocol that ensures the security of synchronization under harsh underwater environments against various attacks, including Sybil attack, replay attack, message manipulation attack, and delay attack. The time synchronization process of CLUSS is divided into three phases: authentication phase, intercluster synchronization phase, and intracluster synchronization phase. During the authentication phase, cluster heads are authenticated to beacons and ordinary nodes are authenticated to cluster heads. During the process of intercluster and intracluster synchronization phases, CLUSS distinguishes the propagation delay of downlink from that of uplink caused by node movement in order to improve time synchronization accuracy. Moreover, part of these two phases can be executed concurrently for reducing the number of messages generated in synchronization. We demonstrate through simulations that CLUSS can reduce synchronization errors as well as energy consumption compared to traditional protocols in various circumstances.
1. Introduction
Underwater Wireless Sensor Networks (UWSNs) have a lot of potential application areas such as oceanographic data collection, disaster prevention, pollution monitoring, offshore exploration, and military surveillance [1–3]. UWSN is a new area of wireless sensor network in underwater environments which has challenges to be overcome such as long propagation delay, severely limited bandwidth, and unpredictable node movement [4–6]. All the above distinct features of UWSNs give birth to new challenging areas for every level of the network protocol suite. Among them, providing clock synchronization is a well-known fundamental issue due to the unique characteristics of UWSNs [7, 8]. A number of important network functionalities require that nodes have a common notion of time, including time stamping of events, distributed data aggregation, MAC, and localization. Meanwhile, numerous time synchronization protocols have been proposed for terrestrial wireless sensor networks, such as RBS [9], TPSN [10], and FSTP [11]. However, they cannot be directly applied to UWSNs, because most of them assume negligible propagation delay among sensor nodes, which is not true in UWSNs. On the other hand, as UWSNs are often deployed in an inaccessible and hostile environment, those unattended sensor nodes are likely to incur many critical security attacks, including Sybil attack, replay attack, message manipulation attack, and delay attack [12, 13]. Therefore, time synchronization must resist modification attempts by attackers, especially in applications such as military surveillance and oceanographic data collection.
Time synchronization attacks have great effects on a set of sensor network applications and services since they heavily rely on accurate time synchronization to perform their respective functions. All attacks on time synchronization protocols of UWSNs aim to deceive some nodes that their neighbor's clocks are at a different time than they actually are. In Sybil attack, a malicious node pretends to have multiple identities. In some cases, an attacker can simply create fabricated identities. If the name space is intentionally limited to prevent attackers from fabricating identities, they can also destroy or temporarily disable the impersonated nodes and assign stolen identities to malicious nodes. In replay attack, a valid data transmission is maliciously or fraudulently repeated. An attacker can take part in distributing timing messages among its neighbor nodes. As a result, old timing messages could be deceitfully issued as legitimate messages to its neighbor nodes for disrupting the timing synchronization process. In message manipulation attack, an attacker may drop, modify, or even forge the exchanged timing messages to interrupt the process of time synchronization. In a delay attack, an attacker intentionally delays some of the time messages in order to disrupt the time synchronization process and cause it to fail. If this attack infiltrates into the system, it cannot be prevented using traditional cryptographic techniques.
In this paper, we propose a novel CLUster-based Secure Synchronization (CLUSS) protocol that concerns security as well as accuracy in synchronization. Before time synchronization, CLUSS needs to execute the process of cluster formation securely by means of cluster consistency checking. After that, CLUSS performs the process of time synchronization, which can be divided into three phases: authentication phase, intercluster synchronization phase, and intracluster synchronization phase. During the authentication phase, all sensor nodes need to be authenticated to each other and the identified malicious nodes will be removed from the network. During the intercluster synchronization phase, cluster heads synchronize themselves with beacons in sender-receiver mode. And then, ordinary nodes synchronize themselves with cluster heads in receiver-receiver mode during the intracluster synchronization phase. Part of intercluster synchronization phase and intracluster synchronization phase can be executed concurrently in order to reduce the number of messages generated in synchronization. In order to improve time synchronization accuracy, CLUSS detects abnormal end-to-end delay data and identifies malicious nodes. Additionally, CLUSS also distinguishes the propagation delay of downlink from that of uplink caused by node movement during the process of calculating clock skew and offset. Numerical simulations confirm the suitability of our protocol compared with the current schemes.
The remainder of the paper is organized as follows: Section 2 presents a brief overview of related work. Section 3 presents the technical details of our time synchronization protocol. Performance evaluation is described in Section 4. Finally, we conclude the paper in Section 5.
2. Related Work
In the literature, there are various time synchronization protocols for distributed systems like terrestrial radio sensor networks. RBS (Reference Broadcast Synchronization) [9] is a well-known receiver-receiver synchronization protocol that synchronizes a set of receivers with one another by periodically sending beacon messages to their neighbors. Recipients use the message's arrival time as a point of reference for comparing their clocks. However, RBS requires extra message exchange to communicate the local timestamps between any two nodes which intend to become synchronized. TPSN (Timing-sync Protocol for Sensor Networks) [10] is based on the sender-receiver time synchronization, which employs a two-way message exchange for synchronization. Although TPSN takes care of propagation delays, it does not take the clock skew into account during synchronization period. FTSP (Flooding Time Synchronization Protocol) [11] supports network topology changes including mobile nodes. The applied flood-based communication protocol provides a very robust network, but it is not applicable to underwater sensor network mainly because it also assumes instant reception of messages. TSHL (Time Synchronization for High Latency) [14] is the first time synchronization algorithm designed for high latency networks specifically. It uses one-way communication to estimate the clock skew and two-way communication to estimate the clock offset. TSHL assumes that underwater sensor networks are static and therefore suffers from sensor nodes mobility, especially when nodes move fast. D-Sync [15] provides an indication of the relative motion between nodes. In D-Sync, Doppler shift is used in order to infer the propagation delay and an ordinary least square estimator is applied to provide an estimate for both clock skew and offset. However, in deriving the estimators, communication channel variability is not taken into account, which reduces the accuracy of synchronization. MU-Sync [16] runs two times of linear regression to estimate the clock skew and clock offset for cluster based UWSNs. MU-Sync assumes that the one-way propagation delay can be estimated as the average round trip time, which causes extra errors and has relative high message overhead. Moreover, none of these protocols take security as one of their goals. Consequently, an adversary can easily attack any of these time synchronization protocols by capturing a fraction of the nodes and have them distribute faulty time synchronization messages. In effect, the nodes in the entire network will be out-of-sync with each other. WATERSync [17] is a correlation-based time synchronization protocol specifically for shallow underwater sensor networks. WATERSync integrates the time synchronization procedure with the tree-like network routing topology in vertical direction (the surface station is the tree root), which consists of Gradual Depth Timing (GDT) phase and Level 1 (i.e., between the surface station and first depth nodes) Skew Compensation (LSC) phase. To make the time synchronization dependable, WATERSync adopts a correlation-based security model to detect outlier timestamp data and identify malicious nodes. However, horizontal direction is neglected during the process of time synchronization, which results in high offset errors.
3. Proposed Scheme
3.1. Network Topology and Cluster Formation
We consider that a UWSN is composed of a large number of nodes uniformly scattered in monitoring fields and represented by
Definition 1.
The function
Two nodes
CLUSS is a CLUster-based Secure Synchronization protocol. Given a UWSN, the whole network is composed of three types of nodes: beacons, cluster heads, and ordinary nodes. Beacons have unlimited energy resources and perfect timing information. For example, they can synchronize to UTC (Universal Time Coordinated) time constantly using GPS services without recalibrating their atomic clocks or performing any synchronization algorithms. In this regard, they provide the time reference for the sensors positioned underwater. If there are two or more beacons, they can communicate with each other through radio frequency (RF) links. Beacons communicate with cluster heads and ordinary nodes through acoustic links. Each cluster has and only has one cluster head. All ordinary nodes connect to their cluster head via single hop. The cluster heads of different clusters connect to a beacon through multiple hops. Figure 1 shows the topology of a UWSN with 8 sensor nodes and one beacon. The beacon is placed on the water surface and is equipped with GPS to obtain UTC time. Each sensor node is assigned a unique identifier (ID). The sensor nodes make autonomous decision about cluster formation without any centralized control.

The topology of a UWSN with 8 sensor nodes.
Definition 2.
Suppose that the cluster for node
Definition 2 gives the meanings of cluster consistency and cluster inconsistency. According to Definition 2, each sensor node belongs to one and only one cluster. Different clusters cannot share any common sensor nodes. It is important for sensor nodes to perform cluster consistency checking during the process of cluster formation.
The process of cluster formation for a UWSN is described as in the following step-by-step instructions.
Step 1. All sensor nodes with 1-hop distance to a beacon are set to cluster heads.
Step 2. Each cluster head will try to add its neighboring nodes as ordinary nodes that belong to its cluster in order of their degrees from high to low. If a sensor node happens to be the neighboring node of multiple cluster heads, it will be assigned to the cluster head with the smallest ID as an ordinary of that cluster.
Step 3. Each ordinary node will try to find its neighboring nodes with 2-hop distance to the cluster head of its current cluster for the purpose of forming new clusters. If there is such a sensor node, the ordinary node will update itself to be the cluster head of a new cluster and add other neighboring nodes with 2-hop distance to its former cluster head into the new cluster as ordinary nodes.
Step 4. Repeat Step 2 and Step 3 until all sensor nodes have identities of either cluster heads or ordinary nodes.
Step 5. Each sensor node performs cluster consistency checking. If it identifies malicious nodes, it removes them from the network and restarts the cluster formation process from Step 1.
Figure 2 shows the process of cluster formation for a UWSN with 8 sensor nodes. Each circle denotes an ordinary node and each concentric circle denotes a cluster head in the UWSN. The concrete steps are given as follows.

The process of cluster formation for a UWSN with 8 sensor nodes.
Step 1. Node 000 and node 001 are set to cluster heads as they are 1-hop distance to the beacon as shown in Figure 2(a).
Step
2. Node 000 tries to add its neighbors as ordinary nodes of its cluster in order of their degrees from high to low, that is, node 011 (
Step 3. The ordinary node 101 in the cluster of node 000 finds that its neighboring node 111 is located 2-hop away from the cluster head node 000. In the same way, the ordinary node 110 in the cluster of node 001 also finds node 111 with 2-hop distance to the cluster head node 001. Since the ID of node 101 is smaller than that of node 110, node 101 will update itself as the cluster head of a new cluster and add node 111 into its cluster as shown in Figure 2(c).
Hereafter, all sensor nodes are assigned identities of either cluster heads or ordinary nodes. After cluster consistency checking, the process of cluster formation is completed.
An attacker may participate in the process of cluster formation using malicious nodes. These malicious nodes can launch different attacks in order to introduce cluster inconsistency. However, as each sensor node has a unique ID, all unicast messages exchanged between nodes can be authenticated with unique pair-wise keys shared with other nodes and broadcast messages can be authenticated with public key based digital signatures. By such means, the process of cluster formation can be executed securely.
3.2. Time Synchronization Protocol
The time synchronization of CLUSS can be divided into three phases: authentication phase, intercluster synchronization phase, and intracluster synchronization phase. During the authentication phase, all sensor nodes need to be authenticated to each other. Cluster heads are authenticated to beacons and ordinary nodes are authenticated to cluster heads. During the intercluster synchronization phase, cluster heads synchronize themselves with beacons in sender-receiver mode. During the intracluster synchronization phase, ordinary nodes synchronize themselves with cluster heads in receiver-receiver mode. In order to reduce the number of messages generated in synchronization, part of intercluster synchronization phase and intracluster synchronization phase can be executed concurrently. Although many existing sender-receiver and receiver-receiver based clock synchronization protocols can be interpreted by common statistical signal processing methods, it is still too early to say that these techniques can get rid of cluster or tree structure especially in those wireless sensor networks with characteristics of long propagation delay and high mobility. The basic idea of our synchronization protocol is simple but effective in realizing time synchronization even when the network is attacked by malicious nodes. To the best of our knowledge, this is the first work that describes secure synchronization protocol for underwater wireless sensor networks.
3.2.1. Authentication between Nodes
We adopt the following notations throughout the description of the protocol as shown in Notations Section.
After the process of cluster formation, all sensor nodes know ID and nonce information of their neighboring nodes. The compromised nodes may attempt to provide falsified clock values, which in turn make the clock adjustment deviate from its desired value. Therefore, each sensor node must authenticate the trustworthiness of synchronization messages it receives from its neighboring nodes before using them for synchronization. In order to realize authentication in the whole network, beacons play an important role during the whole process of authentication. Firstly, cluster heads will be authenticated to beacons. Suppose that C is a cluster head with 1-hop distance to a beacon B. For the purpose of authentication with the beacon B, the cluster head C generates its secret key
In UWSNs, sensor nodes are usually equipped with crystal oscillators for providing local times. Due to aging and environmental factors (such as temperature, pressure, and vibration), these oscillators will gradually exhibit deviations as shown in Figure 3.

Two real clocks with linear and nonlinear deviations from ideal UTC time (initial offset equal to 0).
Assuming the existence of clock skew and drift, the clock value
The basic idea of time synchronization is that the unsynchronized nodes exchange messages with the reference node (already synchronized) in order to estimate clock skews and offsets in local clocks, so that they can correct their local times with that of UTC time and maintain time synchronization by periodical updating their local clocks.
Figure 4 illustrates the process of intercluster and intracluster synchronization in CLUSS.

The process of intercluster and intracluster synchronization in CLUSS.
At first, the cluster head C generates a synchronization request packet Sync-Req, which consists of destination address, source address, identifier, hops, and the number of iterations. After that, the cluster head C creates a synchronization request message
The ordinary node A is not need to reply the synchronization request message
On receiving the synchronization acknowledgement message
3.2.2. Abnormal End-to-End Delay Detection
In order to detect abnormal end-to-end delay data and identify malicious nodes, we consider centered hyperellipsoidal support vector machine (CESVM) [23] as an appropriate scheme for outlier detection in a distributed manner. The basic idea of CESVM is to map the data vectors in the input space to a higher dimensional space, which are centered by means of a kernel function. A hyperellipsoid centered at the origin with minimal effective radius is fitted around the majority of the data vectors in the higher dimensional space. The vectors that fall on or inside the hyperellipsoid are classified as normal and those falling outside the hyperellipsoid are classified as outlier values.
Consider a data set
3.2.3. Clock Skew and Offset Estimation
In CLUSS, the random delays in uplink and downlink are modeled as independent and identically distributed zero mean Gaussian random variables
The timestamp of cluster head C at UTC time
Similarly, the UTC time
Moreover, the timestamp of cluster head C at UTC time
Assuming that
Let
After k iterations of (11) with MAC timestamps, cluster head C's clock skew and offset can be estimated.
And then, cluster head C generates a Sync-Ack packet and broadcasts the synchronization acknowledgement message
Let
The timestamp of ordinary node A at UTC time
Applying (12) to (13), we can get
Applying (12) to (15), we can get
Similarly, we can also get the linear model of
In the same way, cluster head C's neighboring clusters can synchronize their clock times by treating cluster head C as their reference node. This process is repeated until all sensor nodes in the network are synchronized.
3.3. Security Analysis
In this section we discuss how different attacks are prevented by the proposed protocol. We assume that beacons cannot be captured by an attacker as they are physically protected.
In Sybil attack, an attacker tries to create multiple fabricated identities. In our protocol, all sensor nodes along the communication path are authenticated using Elliptic Curve Cryptography (ECC) public-key algorithm, which is feasible for low-end underwater sensors [26]. The sender signs the hash of a synchronization message with its secret key and broadcasts the signature along with the message. The receivers verify the correctness of the signature by using the sender's public key. As a result, an attacker cannot disguise as a legitimate node and cannot exchange any false information between legitimate nodes.
Replay attack is prevented by using a random nonce, which is updated every time the synchronization message which is broadcasted. Thus, an attacker cannot pass the authentication phase even if a malicious node makes a copy of the previous synchronization message.
In order to perform message manipulation attack, an intruder tries to drop, modify, or even forge the exchanged messages to interrupt the process of synchronization. In the proposed protocol, all unicast messages exchanged between nodes can be authenticated with unique pair-wise keys shared with other nodes and broadcast messages can be authenticated with public key based digital signatures. Thus, message manipulation attack is not effective with this protocol.
In a delay attack, an attacker intentionally delays some of the timing messages in order to disrupt the synchronization process and cause it to fail. Our protocol exploits centered hyperellipsoidal support vector machine (CESVM) in order to detect abnormal end-to-end delay data and identify malicious nodes in a distributed manner. All detected abnormal end-to-end delay data will be aborted without using in computation of clock skew and offset. Thus, this attack cannot take place if the proposed protocol is in use.
Of course, obtaining absolutely secure and labeled data for training a classifier could be an impossible task. That is the reason that we consider CESVM as an appropriate scheme for detecting abnormal end-to-end delay data. CESVM belongs to one-class SVM that can model the normal profile of the monitored data while automatically ignoring the errors or anomalies present in the data using unsupervised anomaly detection techniques.
3.4. Complexity Analysis
In order to execute time synchronization protocol completely, each sensor node consumes a certain amount of memory space for storing the information of its neighboring nodes and propagates a finite number of timing messages for synchronization. Moreover, each sensor node should also calculate its clock skew and offset, which will incur nonignorable computational cost. Let
4. Performance Evaluation
4.1. Simulation Settings
We use Aqua-Sim [27] as simulation framework to evaluate our approach. The data packets are also generated by the simulator. Aqua-Sim is an ns-2 based underwater sensor network simulator developed by underwater sensor network lab at University of Connecticut. Aqua-Sim can simulate the attenuation and propagation of acoustic signals. It can also simulate packet collision in underwater sensor networks.
In simulations, we assume that beacons own UTC time and have unlimited energy resources. Other sensor nodes have their own internal clocks and the errors for processing and exchanging of messages among sensor nodes obey Gaussian distribution [28]. The R-MAC [27] protocol is used as the underlying MAC protocol in order to avoid data packet collision and produce timestamp during the process of simulation. The sensor nodes follow the random-walk mobility pattern, which randomly select a direction and move to the new position with a speed between 1 m/s and 5 m/s. Other simulation parameters and their default values are listed in Table 1.
Simulation parameters and their default values.
CESVM is less sensitive to the choice of parameter values than other SVMs. For example, CESVM can achieve an AUC (Area Under roc Curve) in excess of 0.8 for a wide range of kernel parameter values which vary from 0.08 to 41943.04 [22]. Moreover, the effective radius for the CESVM is computed either using any border support vector or using the mean of the support vectors if such border support vector not exists. Therefore, we do not individually discuss the effect of parameters for CESVM on the final results in this paper.
We compared the performance of CLUster-based Secure Synchronization (CLUSS) protocol with that of MU-Sync [16] and WATERSync [17]. Without loss of generality, every data point is obtained as the average of 1000 simulation runs.
4.2. Simulation Results
In the first set of simulations, we compared the errors with time elapsed since synchronization in different synchronization protocols without malicious nodes. The number of sensor nodes is set to 50. As shown in Figure 5, the errors of three synchronization protocols are proportional to the time after synchronization. CLUSS achieves lower errors than that of MU-Sync and WATERSync in the same circumstances. The average error of CLUSS is only 42.4% of MU-Sync and 28.8% of WATERSync after synchronization of 105 seconds. The lowest precision of WATERSync is caused by its high offset errors as it neglects horizontal direction during the process of time synchronization. MU-Sync applies half of the round trip time to compute one way propagation delay, which involves significant errors if sensor nodes move fast or experience long response times. Although the time point MU-Sync used in the second linear regression has decreased propagation delay, the local clock deviation is still large because of the large propagation delay estimation error.

Errors versus time after synchronization without malicious nodes.
Next, we compared the errors with time elapsed since synchronization in different synchronization protocols with 10% malicious nodes. The number of sensor nodes is set to 50 as default (i.e., 45 safe nodes and 5 malicious nodes). As shown in Figure 6, the errors of three synchronization protocols are proportional to the time after synchronization. CLUSS achieves lower errors than that of MU-Sync and WATERSync in the same circumstances. The average error of CLUSS is only 15.4% of MU-Sync and 24.1% of WATERSync after synchronization of 105 seconds. Moreover, compared with Figure 5, the errors of all three protocols increase to some extent. The curve of MU-Sync rises sharply because it has no prevention measures against malicious nodes. As a result, the precision of WATERSync overtakes that of MU-Sync as WATERSync can detect outlier timestamp data and identify some attacks generating by malicious nodes.

Errors versus time after synchronization with 10% malicious nodes.
And then, we compared the errors with average node speed in different synchronization protocols with 10% malicious nodes. The synchronization time is set to 10 seconds. As shown in Figure 7, the errors of three synchronization protocols are proportional to the average node speed. MU-Sync obtains the highest synchronization error among the three synchronization protocols when their average node speeds are same. Moreover, with the increase of average node speed, the curve of MU-Sync shows a rapid rising compared with other synchronization protocols. The curve of WATERSync indicates that the error is approximately linear with the average node speed. The error of CLUSS is obviously lower than that of MU-Sync and WATERSync. Furthermore, with the increase of average node speed, the accumulated errors of CLUSS display a mild growth. On average, the error of CLUSS is only 25.6% of MU-Sync and 57.6% of WATERSync.

Errors versus average node speed.
After that, we compared the errors with the number of nodes in different synchronization protocols with 10% malicious nodes. The synchronization time is also set to 10 seconds. As shown in Figure 8, the errors of three synchronization protocols are proportional to the number of nodes. CLUSS achieves the lowest errors among the three protocols in the same circumstances. The average error of CLUSS is only 34.3% of MU-Sync and 72.5% of WATERSync.

Errors versus number of nodes.
In addition, we also compared the errors with the rate of malicious nodes in different synchronization protocols. The number of sensor nodes is set to 50 and the average node speed is set to 1 m/s as default. As shown in Figure 9, the errors of three synchronization protocols are proportional to the rate of malicious nodes. CLUSS achieves lower errors than that of MU-Sync and WATERSync in the same circumstances. The curve of CLUSS is also gentler than that of MU-Sync and WATERSync. When the rate of malicious nodes is not above 6%, the error of MU-Sync is slightly lower than that of WATERSync. When the rate of malicious nodes is not less than 10%, the error of MU-Sync becomes higher than that of WATERSync. Overall, the average error of CLUSS is only 34.4% of MU-Sync and 62.3% of WATERSync.

Errors versus rate of malicious nodes.
In the second set of simulations, we compared the number of messages with time elapsed since synchronization in different synchronization protocols with 10% malicious nodes. The synchronization time is set to 10 seconds. As shown in Figure 10, the number of messages is proportional to the time elapsed since synchronization. CLUSS produces the minimum number of messages, while WATERSync generates the maximum number of messages. Moreover, the curve of CLUSS indicates gentler slope compared with that of MU-Sync and WATERSync. Overall, CLUSS decreases 7.1% of the number of messages than that of MU-Sync and 32.7% of the number of messages than that of WATERSync on average after time synchronization. This is because part of intercluster synchronization phase and intracluster synchronization phase in CLUSS can be executed concurrently, which in turn reduces the number of messages generated in synchronization.

Number of messages versus time after synchronization.
After that, we compared the number of messages with the number of nodes in different synchronization protocols with 10% malicious nodes. As shown in Figure 11, the number of messages is proportional to the number of nodes in three synchronization protocols. CLUSS produces fewer messages than that of MU-Sync and WATERSync with the same number of nodes. Moreover, the slope of the curve in CLUSS is gentler than that of MU-Sync and WATERSync. Overall, CLUSS decreases 14.9% of the number of messages than that of MU-Sync and 35.4% of the number of messages than that of WATERSync on average.

Number of messages versus number of nodes.
In the last set of simulations, we compared the number of iterations with error tolerance in different synchronization protocols as shown in Figure 12. The amount of energy consumed by resynchronization is represented by the number of iterations over a period of 105 seconds of operating time for various values of error tolerance. The number of iterations is inversely proportional to error tolerance in three synchronization protocols. Under the same condition, CLUSS outperforms MU-Sync and WATERSync due to its ability to estimate skew more accurately. On average, CLUSS only needs 46.5% of iterations compared to MU-Sync and 22.1% of iterations compared to WATERSync.

Number of iterations versus error tolerance.
4.3. Discussion
When an existing sensor node leaves the network due to battery outage, if this sensor node is not the cluster head of any cluster, then there is nothing to do. If this sensor node is a cluster head, then the system will execute the process of cluster formation and assign new cluster heads for the newly formed clusters. When a new sensor node joins the network, the system will execute the process of cluster formation and assign new cluster heads for the newly formed clusters if needed. Furthermore, the new sensor node should also synchronize its clock with the whole network. Therefore, the cost for cluster maintenance cannot be neglected in highly dynamic and unstable networks where nodes frequently join and leave. However, in a UWSN, each sensor node is attached to a surface buoy by a wire that can be adjusted for proper and suitable length or anchored to the ocean bottom using weights. Moreover, the network battery life is sufficiently long to avoid recharging or replacing node batteries frequently in harsh underwater environments. Hence, the topology of the network does not change frequently after initial deployment and the cost for cluster maintenance only has a trifling impact on the proposed method in a UWSN.
5. Conclusion
This paper proposed a CLUster-based Secure Synchronization (CLUSS) protocol that ensures the security of synchronization under harsh underwater environments against various attacks, including Sybil attack, replay attack, message manipulation attack, and delay attack. The time synchronization process of CLUSS is divided into three phases: authentication phase, intercluster synchronization phase, and intracluster synchronization phase. During the authentication phase, cluster heads are authenticated to beacons and ordinary nodes are authenticated to cluster heads. During the process of intercluster and intracluster synchronization phases, CLUSS distinguishes the propagation delay of downlink from that of uplink caused by node movement in order to improve time synchronization accuracy. Moreover, part of these two phases can be executed concurrently for reducing the number of messages generated in synchronization. We demonstrate through simulations that CLUSS can reduce synchronization errors as well as the number of synchronization messages than traditional protocols even when the network is attacked by malicious nodes. In future work, we will investigate the influence of MAC layer activities to the performance of time synchronization protocols, such as packet loss and retransmission. Moreover, we will analysis the adaptability of our protocol and evaluate its performance through real ocean experiments.
Footnotes
Notations
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This work was sponsored by the National Nature Science Foundation of China (61202370, 51279099), the Innovation Program of Shanghai Municipal Education Commission (14YZ110), the Shanghai Pujiang Program from Science and Technology Commission of Shanghai Municipality (11PJ1404300), and the Open Program of Shanghai Key Laboratory of Intelligent Information Processing (IIPL-2011-008).
