{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:59:50Z","timestamp":1725494390777},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540766261"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76627-8_26","type":"book-chapter","created":{"date-parts":[[2007,11,5]],"date-time":"2007-11-05T10:44:09Z","timestamp":1194259449000},"page":"340-356","source":"Crossref","is-referenced-by-count":6,"title":["Secure and Self-stabilizing Clock Synchronization in Sensor Networks"],"prefix":"10.1007","author":[{"given":"Jaap-Henk","family":"Hoepman","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Larsson","sequence":"additional","affiliation":[]},{"given":"Elad M.","family":"Schiller","sequence":"additional","affiliation":[]},{"given":"Philippas","family":"Tsigas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Abramson, N., et al.: The Aloha System. Univ. of Hawaii (1972)"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/11516798_22","volume-title":"OPODIS 2004","author":"M. Demirbas","year":"2005","unstructured":"Demirbas, M., Arora, A., Nolte, T., Lynch, N.A.: A hierarchy-based fault-local stabilizing algorithm for tracking in sensor networks. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol.\u00a03544, pp. 299\u2013315. Springer, Heidelberg (2005)"},{"issue":"11","key":"26_CR3","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1145\/361179.361202","volume":"17","author":"E.W. Dijkstra","year":"1974","unstructured":"Dijkstra, E.W.: Self-stabilizing systems in spite of distributed control. Commun. ACM\u00a017(11), 643\u2013644 (1974)","journal-title":"Commun. ACM"},{"key":"26_CR4","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/6156.001.0001","volume-title":"Self-Stabilization","author":"S. Dolev","year":"2000","unstructured":"Dolev, S.: Self-Stabilization. MIT Press, Cambridge (2000)"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","first-page":"130","volume-title":"DISC 2007","author":"S. Dolev","year":"2007","unstructured":"Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.: Gossiping in a Multi-Channel Radio Network, An Oblivious Approach to Coping with Malicious Interference. In: DISC 2007. LNCS, vol.\u00a04731, pp. 130\u2013145. Springer, Heidelberg (2007)"},{"issue":"SI","key":"26_CR6","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/844128.844143","volume":"36","author":"J. Elson","year":"2002","unstructured":"Elson, J., Girod, L., Estrin, D.: Fine-grained network time synchronization using reference broadcasts. Operating Systems Review (ACM SIGOPS)\u00a036(SI), 147\u2013163 (2002)","journal-title":"Operating Systems Review (ACM SIGOPS)"},{"key":"26_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1007\/978-3-540-24698-5_63","volume-title":"LATIN 2004: Theoretical Informatics","author":"J. Elson","year":"2004","unstructured":"Elson, J., Karp, R.M., Papadimitriou, C.H., Shenker, S.: Global synchronization in sensornets. In: Farach-Colton, M. (ed.) LATIN 2004. LNCS, vol.\u00a02976, pp. 609\u2013624. Springer, Heidelberg (2004)"},{"issue":"2","key":"26_CR8","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.jss.2005.06.001","volume":"79","author":"E. Farrugia","year":"2006","unstructured":"Farrugia, E., Simon, R.: An efficient and secure protocol for sensor network time synchronization. J. Syst. Softw.\u00a079(2), 147\u2013162 (2006)","journal-title":"J. Syst. Softw."},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1080793.1080809","volume-title":"WISE 2005","author":"S. Ganeriwal","year":"2005","unstructured":"Ganeriwal, S., Capkun, S., Han, C.-C., Srivastava, M.B.: Secure time synchronization service for sensor networks. In: Ngu, A.H.H., Kitsuregawa, M., Neuhold, E.J., Chung, J.Y., Sheng, Q.Z. (eds.) WISE 2005. LNCS, vol.\u00a03806, pp. 97\u2013106. Springer, Heidelberg (2005)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Capkun, S., Srivastava, M.B.: Secure time synchronization in sensor networks. ACM Transactions on Information and Systems Security (March 2006)","DOI":"10.1145\/1080793.1080809"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/11945529_16","volume-title":"OPODIS 2006","author":"S. Gilbert","year":"2006","unstructured":"Gilbert, S., Guerraoui, R., Newport, C.C.: Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In: Shvartsman, A.A. (ed.) OPODIS 2006. LNCS, vol.\u00a04305, pp. 215\u2013229. Springer, Heidelberg (2006)"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-540-49823-0_24","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"T. Herman","year":"2006","unstructured":"Herman, T., Zhang, C.: Best paper: Stabilizing clock synchronization for wireless sensor networks. In: Datta, A.K., Gradinariu, M. (eds.) SSS 2006. LNCS, vol.\u00a04280, pp. 335\u2013349. Springer, Heidelberg (2006)"},{"issue":"3","key":"26_CR13","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R.E., Pease, M.C.: The byzantine generals problem. ACM Trans. Program. Lang. Syst.\u00a04(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"26_CR14","unstructured":"Larsson, A., Schiller, E.M., Tsigas, P.: Secure and fault-tolerant clock synchronization in sensor networks. TR 2006:16, Computer Science and Engineering, Chalmers University of technology (September 2006)"},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1102219.1102238","volume-title":"SASN 2005","author":"M. Manzo","year":"2005","unstructured":"Manzo, M., Roosta, T., Sastry, S.: Time synchronization attacks in sensor networks. In: SASN 2005. Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 107\u2013116. ACM Press, New York (2005)"},{"key":"26_CR16","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1002\/047174414X.ch7","volume-title":"Handbook of Sensor Networks: Algorithms and Architectures","author":"K. R\u00f6mer","year":"2005","unstructured":"R\u00f6mer, K., Blum, P., Meier, L.: Time synchronization and calibration in wireless sensor networks. In: Stojmenovic, I. (ed.) Handbook of Sensor Networks: Algorithms and Architectures, pp. 199\u2013237. John Wiley and Sons, Chichester (2005)"},{"key":"26_CR17","doi-asserted-by":"publisher","first-page":"165","DOI":"10.2307\/1268549","volume":"25","author":"B. Rosner","year":"1983","unstructured":"Rosner, B.: Percentage points for a generalized esd many-outlier procedure. Technometrics\u00a025, 165\u2013172 (1983)","journal-title":"Technometrics"},{"key":"26_CR18","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)","edition":"2"},{"issue":"1","key":"26_CR19","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.adhoc.2006.05.016","volume":"5","author":"H. Song","year":"2007","unstructured":"Song, H., Zhu, S., Cao, G.: Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks\u00a05(1), 112\u2013125 (2007)","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"26_CR20","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/TDSC.2005.36","volume":"2","author":"K. Sun","year":"2005","unstructured":"Sun, K., Ning, P., Wang, C.: Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE Transactions on Dependable and Secure Computing\u00a02(3), 177\u2013189 (2005)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"26_CR21","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JSAC.2005.861396","volume":"24","author":"K. Sun","year":"2006","unstructured":"Sun, K., Ning, P., Wang, C.: Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 395\u2013408 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"26_CR22","first-page":"264","volume-title":"ACM Conference on Computer and Communications Security","author":"K. Sun","year":"2006","unstructured":"Sun, K., Ning, P., Wang, C.: Tinysersync: secure and resilient time synchronization in wireless sensor networks. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM Conference on Computer and Communications Security, pp. 264\u2013277. ACM Press, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76627-8_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:55:26Z","timestamp":1619506526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76627-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540766261"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76627-8_26","relation":{},"subject":[]}}