{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:10:12Z","timestamp":1749787812718,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_1","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T12:34:29Z","timestamp":1479904469000},"page":"3-22","source":"Crossref","is-referenced-by-count":6,"title":["An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms"],"prefix":"10.1007","author":[{"given":"Kristof","family":"Teichel","sequence":"first","affiliation":[]},{"given":"Dieter","family":"Sibold","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Milius","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Alur, R., Courcoubetis, C., Dill, D.: Model-checking for real-time systems. In: Proceedings of Fifth Annual IEEE Symposium on Logic in Computer Science, LICS 1990, pp. 414\u2013425, June 1990","DOI":"10.1109\/LICS.1990.113766"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-30080-9_7","volume-title":"Formal Methods for the Design of Real-Time Systems","author":"G Behrmann","year":"2004","unstructured":"Behrmann, G., David, A., Larsen, K.G.: A tutorial on Uppaal. In: Bernardo, M., Corradini, F. (eds.) SFM-RT 2004. LNCS, vol. 3185, pp. 200\u2013236. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-30080-9_7"},{"key":"1_CR3","unstructured":"Brakke, E., Cohen, I.E., Goldberg, S., Malhotra, A.: Attacking the network time protocol. In: Network and Distributed System Security Symposium (NDSS), February 2016"},{"key":"1_CR4","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"IT\u201329","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory IT\u201329, 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1_CR5","unstructured":"Dowling, B., Stebila, D., Zaverucha, G.: Authenticated network time synchronization. Cryptology ePrint Archive, Report 2015\/171 (2015). http:\/\/eprint.iacr.org\/2015\/171"},{"key":"1_CR6","unstructured":"Floeter, R.: Authenticated TLS constraints in ntpd(8). Web Post, February 2015. https:\/\/marc.info\/?l=openbsd-tech&m=142356166731390&w=2"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., P\u00f6pper, C., Capkun, S., Srivastava, M.B.: Secure time synchronization in sensor networks (E-SPS). In: Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005), pp. 97\u2013106, September 2005","DOI":"10.1145\/1080793.1080809"},{"key":"1_CR8","unstructured":"Hu, X., Feng, R.: Message broadcast authentication in $$\\mu $$ TESLA based on double filtering mechanism. In: 2011 International Conference on Internet Technology and Applications (iTAP), pp. 1\u20134 (2011). http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6006446"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Lee, K., Eidson, J.: IEEE-1588 standard for a precision clock synchronization protocol for networked measurement and control systems. In: 34th Annual Precise Time and Time Interval (PTTI) Meeting, pp. 98\u2013105 (2002)","DOI":"10.1109\/SFICON.2002.1159815"},{"issue":"4","key":"1_CR10","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1145\/1027794.1027800","volume":"3","author":"D Liu","year":"2004","unstructured":"Liu, D., Ning, P.: Multilevel $$\\mu $$ TESLA: broadcast authentication for distributed sensor networks. ACM Trans. Embed. Comput. Syst. 3(4), 800\u2013836 (2004). http:\/\/dl.acm.org\/citation.cfm?doid=1027794.1027800","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Mills, D., Haberman, B.: Network time protocol version 4: autokey specification. RFC 5906, IETF Secretariat, June 2010. https:\/\/tools.ietf.org\/html\/rfc5906","DOI":"10.17487\/rfc5906"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Mills, D., Martin, J., Burbank, J., Kasch, W.: Network time protocol version 4: protocol and algorithms specification. RFC 5905, IETF Secretariat, June 2010. https:\/\/tools.ietf.org\/html\/rfc5905","DOI":"10.17487\/rfc5905"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Mills, D.L.: Network time protocol (version 3): specification, implementation and analysis. RFC 1305, IETF Secretariat, March 1992. https:\/\/tools.ietf.org\/html\/rfc1305","DOI":"10.17487\/rfc1305"},{"key":"1_CR14","doi-asserted-by":"crossref","DOI":"10.1201\/9781420006155","volume-title":"Computer Network Time Synchronization: The Network Time Protocol","author":"DL Mills","year":"2006","unstructured":"Mills, D.L.: Computer Network Time Synchronization: The Network Time Protocol. CRC Press, Boca Raton (2006). http:\/\/www.loc.gov\/catdir\/enhancements\/fy0664\/2005056889-d.html"},{"key":"1_CR15","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1109\/90.731182","volume":"6","author":"DL Mills","year":"1998","unstructured":"Mills, D.L., Acm, M.: Adaptive hybrid clock discipline algorithm for the network time protocol. IEEE\/ACM Trans. Networking 6, 505\u2013514 (1998)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"1_CR16","unstructured":"Mizrahi, T.: Security Requirements of Time Protocols in Packet Switched Networks (2014). http:\/\/www.rfc-editor.org\/rfc\/pdfrfc\/rfc7384.txt.pdf"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Na, R., Hori, Y.: DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things. In: 2012 International Conference on Selected Topics in Mobile and Wireless Networking (iCOST), pp. 60\u201365, June 2012. http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6271291","DOI":"10.1109\/iCOST.2012.6271291"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Perrig, A., Song, D., Canetti, R., Tygar, J.D., Briscoe, B.: Timed efficient stream loss-tolerant authentication (TESLA): multicast source authentication transform introduction. RFC 4082, IETF Secretariat, June 2005. https:\/\/tools.ietf.org\/html\/rfc4082","DOI":"10.17487\/rfc4082"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: security protocols for sensor networks. In: Wireless Networks, pp. 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"key":"1_CR20","unstructured":"Roettger, S.: Analysis of the NTP autokey procedures. Web Publication of Project Thesis, February 2012. http:\/\/zero-entropy.de\/autokey_analysis.pdf"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Shpiner, A., Revah, Y., Mizrahi, T.: Multi-path time protocols. In: 2013 International IEEE Symposium on Precision Clock Synchronization for Measurement Control and Communication (ISPCS), pp. 1\u20136, September 2013","DOI":"10.1109\/ISPCS.2013.6644754"},{"key":"1_CR22","unstructured":"Sibold, D., Teichel, K., Roettger, S.: Network time security, July 2013. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-ntp-network-time-security\/"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Sibold, D., Teichel, K., Roettger, S.: Using the network time security specification to secure the network time protocol, March 2015. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-ntp-using-nts-for-ntp\/","DOI":"10.1109\/EFTF.2016.7477786"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Sun, K., Ning, P., Wang, C.: TinySeRSync: secure and resilient time synchronization in wireless sensor networks. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, NY, USA, pp. 264\u2013277 (2006). http:\/\/dl.acm.org\/citation.cfm?doid=1180405.1180439","DOI":"10.1145\/1180405.1180439"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Syverson, P., Meadows, C., Cervesato, I.: Dolev-Yao is no better than Machivelli. In: First Workshop on Issues in the Theory of Security - WITS 2000, pp. 87\u201392 (2000)","DOI":"10.21236\/ADA464936"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Weiss, M.A., Eidson, J., Barry, C., Broman, D., Iannucci, B., Lee, E.A., Stanton, S.K., Goldin, L.: Time-aware applications, computers, and communication systems (TAACCS). NIST Technical note 1867, February 2015","DOI":"10.6028\/NIST.TN.1867"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Xianglan, Y., Wangdong, Q., Fei, F.: ASTS: an agile secure time synchronization protocol for wireless sensor networks. In: International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2007, pp. 2808\u20132811, September 2007","DOI":"10.1109\/WICOM.2007.697"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T20:41:45Z","timestamp":1749760905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}