-
1
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
S. Ganeriwal, S. Capkun, S. Han, and M. B. Srivastava, "Secure time synchronization service for sensor networks," in the ACM Workshop on Wireless Security (WiSe), October 2005.
-
ACM Workshop on Wireless Security (WiSe), October 2005
-
-
Ganeriwal, S.1
Capkun, S.2
Han, S.3
Srivastava, M.B.4
-
2
-
-
84978422134
-
Fine-grained network time synchronization using reference broadcasts
-
J. Elson, L. Girod, and D. Estrin, "Fine-grained network time synchronization using reference broadcasts," in OSDI '02: Proceedings of the Fifth Symposium on Operating Systems Design and Implementation, vol. 36, 2002, pp. 147-163.
-
(2002)
OSDI '02: Proceedings of the Fifth Symposium on Operating Systems Design and Implementation
, vol.36
, pp. 147-163
-
-
Elson, J.1
Girod, L.2
Estrin, D.3
-
3
-
-
11244272924
-
Timing-sync protocol for sensor networks
-
S. Ganeriwal, R. Kumar, and M. B. Srivastava, "Timing-sync protocol for sensor networks," in SenSys '03: Proceedings of the First International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA, September 2003, pp. 138-149.
-
SenSys '03: Proceedings of the First International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA, September 2003
, pp. 138-149
-
-
Ganeriwal, S.1
Kumar, R.2
Srivastava, M.B.3
-
4
-
-
27644533289
-
The flooding time synchronization protocol
-
M. Maróti, B. Kusy, G. Simon, and Ákos Lédeczi, "The flooding time synchronization protocol," in SenSys '04: Proceedings of the Second International Conference on Embedded Networked Sensor Systems, 2004, pp. 39-49.
-
SenSys '04: Proceedings of the Second International Conference on Embedded Networked Sensor Systems, 2004
, pp. 39-49
-
-
Maróti, M.1
Kusy, B.2
Simon, G.3
Lédeczi, Á.4
-
5
-
-
51649089906
-
Testbed implementation of a secure flooding time synchronization protocol
-
T. Roosta, W.-C. Liao, W.-C. Teng, and S. Sastry, "Testbed implementation of a secure flooding time synchronization protocol," in Wireless Communications and Networking Conference, March 2008, pp. 3157-3162.
-
Wireless Communications and Networking Conference, March 2008
, pp. 3157-3162
-
-
Roosta, T.1
Liao, W.-C.2
Teng, W.-C.3
Sastry, S.4
-
6
-
-
77953072003
-
Fault-tolerant flooding time synchronization protocol for wireless sensor networks
-
L. Gheorghe, R. Rughinis, and N. Tapus, "Fault-tolerant flooding time synchronization protocol for wireless sensor networks," in Sixth International Conference on Networking and Services (ICNS), March 2010, pp. 143-149.
-
Sixth International Conference on Networking and Services (ICNS), March 2010
, pp. 143-149
-
-
Gheorghe, L.1
Rughinis, R.2
Tapus, N.3
-
7
-
-
33745931868
-
Time synchronization attacks in sensor networks
-
M. Manzo, T. Roosta, and S. Sastry, "Time synchronization attacks in sensor networks," in SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, New York, NY, USA, 2005, pp. 107-116.
-
SASN '05: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, NY, USA, 2005
, pp. 107-116
-
-
Manzo, M.1
Roosta, T.2
Sastry, S.3
-
9
-
-
84947273682
-
The sybil attack
-
J. R. Douceur, "The sybil attack," in IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, London, UK, 2002, pp. 251-260.
-
IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, London, UK, 2002
, pp. 251-260
-
-
Douceur, J.R.1
-
10
-
-
67249124619
-
Clock skew based node identification in wireless sensor networks
-
D.-J. Huang, W.-C. Teng, C.-Y. Wang, H.-Y. Huang, and J. M. Hellerstein, "Clock skew based node identification in wireless sensor networks,"in IEEE Global Communications Conference, 2008, pp. 1877-1881.
-
IEEE Global Communications Conference, 2008
, pp. 1877-1881
-
-
Huang, D.-J.1
Teng, W.-C.2
Wang, C.-Y.3
Huang, H.-Y.4
Hellerstein, J.M.5
-
11
-
-
77952778091
-
Toward clock skew based wireless sensor node services
-
M. Uddin and C. Castelluccia, "Toward clock skew based wireless sensor node services," in Wireless Internet Conference (WICON), 2010 The 5th Annual ICST, March 2010, pp. 1-9.
-
Wireless Internet Conference (WICON), 2010 the 5th Annual ICST, March 2010
, pp. 1-9
-
-
Uddin, M.1
Castelluccia, C.2
|