{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:53:39Z","timestamp":1725558819987},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642143052"},{"type":"electronic","value":"9783642143069"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14306-9_33","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T10:20:26Z","timestamp":1277806826000},"page":"321-332","source":"Crossref","is-referenced-by-count":3,"title":["An Approach towards Time Synchronization Based Secure Protocol for Wireless Sensor Network"],"prefix":"10.1007","author":[{"given":"Arun Kumar","family":"Tripathi","sequence":"first","affiliation":[]},{"given":"Ajay","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"33_CR1","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"B. Mukherjee","year":"2008","unstructured":"Mukherjee, B., Ghosal, D., Yick, J.: Wireless sensor network survey. Computer Network\u00a052(12), 2292\u20132330 (2008)","journal-title":"Computer Network"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Kshemkalyani, A.D., Sundararaman, B., Buy, U.: Clock synchronization for wireless sensor networks. A Survey on Ad-hoc Networks, 281\u2013323 (2005)","DOI":"10.1016\/j.adhoc.2005.01.002"},{"key":"33_CR3","first-page":"369","volume-title":"Proceedings of","author":"S. Capkunl","year":"2006","unstructured":"Capkunl, S., Ganeriwal, S., Han, S., Srivastava, M.: Securing Timing Synchronization in Sensor Networks. In: Proceedings of, pp. 369\u2013390. Springer, New York (2006)"},{"key":"33_CR4","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-540-77018-3_52","volume-title":"Emerging Technologies in Knowledge Discovery and Data Mining","author":"H. Li","year":"2007","unstructured":"Li, H., Chen, K., Wen, M., Zheng, Y.: A Secure Time Synchronization Protocol for Sensor Network. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol.\u00a04819, pp. 515\u2013526. Springer, Heidelberg (2007)"},{"issue":"2","key":"33_CR5","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JSAC.2005.861396","volume":"24","author":"C. Wang","year":"2006","unstructured":"Wang, C., Ning, P., Sun, K.: Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 395\u2013408 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Song, H., Zhu, G.C.S.: Attack-resilient time synchronization for wireless sensor networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, p. 772 (2005)","DOI":"10.1109\/MAHSS.2005.1542869"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Estrin, D., Elson, J., Girod, L.: Fine-grained network time synchronization using reference broadcasts. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation Special Issue, Boston, pp. 147\u2013163 (2002)","DOI":"10.1145\/844128.844143"},{"key":"33_CR8","unstructured":"Srivastava, M.B., Kumar, R., Ganeriwal, S.: Timing-sync protocol for sensor Networks. In: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems, Los Angeles, CA, pp. 138\u2013149 (2003)"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Popper, C., Capkun, S., Srivastava, M.B.: Secure Time Synchronization in Sensor Networks. ACM Transactions on Information and System Security, Article No: 23, 11(4) (2008)","DOI":"10.1145\/1380564.1380571"},{"key":"33_CR10","unstructured":"Simon, G., Kusy, B., Ledeczi Maroti, M.: A Clock synchronization for wireless sensor networks: A Survey. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 30\u201349 (2004)"},{"key":"33_CR11","unstructured":"Trappe, W., Xu., W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana Champaign, IL, USA, pp. 46\u201357 (2005)"},{"key":"33_CR12","unstructured":"Hu, H., Atakli, I.M., Chen, Y., Ku, W.-S., Su, Z.: Malicious Node Detection in Wireless Sensor Networks. In: The Symposium on Simulation of Systems Security, pp. 836\u2013843 (2008)"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"33_CR14","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution scheme for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197 (2003)"},{"issue":"8","key":"33_CR15","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TC.1987.5009516","volume":"36","author":"H. Kopetz","year":"1987","unstructured":"Kopetz, H., Ochsenreiter, W.: Clock Synchronization in Distributed Real-Time Systems. IEEE Transactions on Computers\u00a036(8), 933\u2013940 (1987)","journal-title":"IEEE Transactions on Computers"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Hwang, J., Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, USA, pp. 43\u201352 (2004)","DOI":"10.1145\/1029102.1029111"},{"key":"33_CR17","unstructured":"Jajodia, S., Setia, S., Zhu, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington DC., USA, pp. 62\u201372 (2003)"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Cayirci, E., Akyildiz, I.F., Su, W., Sankarasubramaniam, Y.: A Survey on Sensor Networks. IEEE Communications Magazine, 102\u2013114 (2002)","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Manzo, M., Roosta, T., Sastry, S.: Time synchronization attacks in sensor networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 107\u2013116 (2005)","DOI":"10.1145\/1102219.1102238"},{"key":"33_CR20","unstructured":"Ping, S.: Delay Measurement Time Synchronization for Wireless Sensor Networks, Intel Corporation, Intel Research, Berkeley (2002)"}],"container-title":["Communications in Computer and Information Science","Networked Digital Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14306-9_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:50:49Z","timestamp":1606168249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14306-9_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642143052","9783642143069"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14306-9_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}