{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:22:54Z","timestamp":1725765774050},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319030708"},{"type":"electronic","value":"9783319030715"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-03071-5_14","type":"book-chapter","created":{"date-parts":[[2013,12,19]],"date-time":"2013-12-19T15:05:53Z","timestamp":1387465553000},"page":"111-123","source":"Crossref","is-referenced-by-count":0,"title":["Node Identification Using Clock Skew"],"prefix":"10.1007","author":[{"given":"Ibrahim Ethem","family":"Bagci","sequence":"first","affiliation":[]},{"given":"Utz","family":"Roedig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,20]]},"reference":[{"key":"14_CR1","unstructured":"Atmel: Atmel ATSHA204 datasheet. \n                    http:\/\/www.atmel.com\/Images\/Atmel-8740-CryptoAuth-ATSHA204-Datasheet.pdf\n                    \n                   (2012). Accessed Mar 2012"},{"issue":"2","key":"14_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TDSC.2005.26","volume":"2","author":"T Kohno","year":"2005","unstructured":"Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93\u2013108 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"14_CR3","unstructured":"Uddin, M., Castelluccia, C.: Toward clock skew based wireless sensor node services. In: Wireless Internet Conference (WICON), 2010 The 5th Annual ICST, pp. 1\u20139 (2010)"},{"key":"14_CR4","unstructured":"Zander, S., Murdoch, S.J.: An improved clock-skew measurement technique for revealing hidden services. In: Proceedings of the 17th Conference on Security Symposium. SS\u201908, pp. 211\u2013225. USENIX Association, Berkeley (2008)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Jana, S., Kasera, S.K.: On fast and accurate detection of unauthorized wireless access points using clock skews. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking. MobiCom \u201908, pp. 104\u2013115. ACM, New York (2008)","DOI":"10.1145\/1409944.1409958"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Arackaparambil, C., Bratus, S., Shubina, A., Kotz, D.: On the reliability of wireless fingerprinting using clock skews. In: Proceedings of the Third ACM Conference on Wireless Network Security. WiSec \u201910, pp. 169\u2013174. ACM, New York (2010)","DOI":"10.1145\/1741866.1741894"},{"key":"14_CR7","unstructured":"Huang, D.J., Teng, W.C., Wang, C.Y., Huang, H.Y., Hellerstein, J.: Clock skew based node identification in wireless sensor networks. In: Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008, pp. 1\u20135. IEEE (2008)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Mar\u00f3ti, M., Kusy, B., Simon, G., L\u00e9deczi, A.: The flooding time synchronization protocol. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. SenSys \u201904, pp. 39\u201349. ACM, New York (2004)","DOI":"10.1145\/1031495.1031501"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J.: Hot or not: revealing hidden services by their clock skew. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS \u201906, pp. 27\u201336. ACM, New York (2006)","DOI":"10.1145\/1180405.1180410"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Moon, S., Skelly, P., Towsley, D.: Estimation and removal of clock skew from network delay measurements. In: INFOCOM \u201999. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings, vol. 1, pp. 227\u2013234. IEEE (1999)","DOI":"10.1109\/INFCOM.1999.749287"},{"key":"14_CR11","unstructured":"Dunkels, A.: The ContikiMAC Radio Duty Cycling Protocol. Technical Report T2011:13, Swedish Institute of Computer Science. Dec 2011"},{"key":"14_CR12","unstructured":"Zolertia: Zolertia Z1 datasheet. \n                    http:\/\/zolertia.com\/sites\/default\/files\/Zolertia-Z1-Datasheet.pdf\n                    \n                   (2010). Accessed Mar 2010"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Pettinato, P., Wirstrm, N., Eriksson, J., Voigt, T.: Multi-channel two-way time of flight sensor network ranging. In: Picco, G., Heinzelman, W. (eds.) Wireless Sensor Networks. Lecture Notes in Computer Science, vol. 7158, pp. 163\u2013178. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-28169-3_11"},{"key":"14_CR14","unstructured":"Texas Instruments: 2.4 GHz IEEE 802.15.4 \/ ZigBee-Ready RF Transceiver (Rev. C). \n                    http:\/\/www.ti.com\/lit\/ds\/symlink\/cc2420.pdf\n                    \n                   (2013). Accessed Mar 2013"}],"container-title":["Lecture Notes in Electrical Engineering","Real-World Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03071-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T17:30:25Z","timestamp":1558805425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03071-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,20]]},"ISBN":["9783319030708","9783319030715"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03071-5_14","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013,12,20]]}}}