{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:31:05Z","timestamp":1775665865115,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T00:00:00Z","timestamp":1628812800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T00:00:00Z","timestamp":1628812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s42979-021-00796-1","type":"journal-article","created":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T13:02:46Z","timestamp":1628859766000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Security Threat Analysis and Countermeasures on Consensus-Based Time Synchronization Algorithms for Wireless Sensor Network"],"prefix":"10.1007","volume":"2","author":[{"given":"Suresh Kumar","family":"Jha","sequence":"first","affiliation":[]},{"given":"Anil","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Niranjan","family":"Panigrahi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,13]]},"reference":[{"key":"796_CR1","doi-asserted-by":"publisher","unstructured":"Jha SK, Panigrahi N, Gupta A. Security threats for time synchronization protocols in the internet of things. In: Principles of Internet of Things (IoT) ecosystem: insight paradigm, January 2020, pp 495\u2013517. 2020. https:\/\/doi.org\/10.1007\/978-3-030-33596-0_20.","DOI":"10.1007\/978-3-030-33596-0_20"},{"key":"796_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2890887","author":"M Ruan","year":"2019","unstructured":"Ruan M, Gao H, Wang Y. Secure and privacy-preserving consensus. IEEE Trans Autom Control. 2019. https:\/\/doi.org\/10.1109\/TAC.2019.2890887.","journal-title":"IEEE Trans Autom Control"},{"key":"796_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2420952\u00b7","author":"SK Dhuli","year":"2014","unstructured":"Dhuli SK, Gaurav K, Singh YN. Convergence analysis for regular wireless consensus networks. IEEE Sens J. 2014. https:\/\/doi.org\/10.1109\/JSEN.2015.2420952\u00b7.","journal-title":"IEEE Sens J"},{"key":"796_CR4","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/5281","author":"G Xiong","year":"2009","unstructured":"Xiong G, Kishore S. Analysis of distributed consensus time synchronization with Gaussian delay over wireless sensor networks. EURASIP J Wirel Commun Netw. 2009. https:\/\/doi.org\/10.1155\/2009\/5281.","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"796_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2875250","author":"Y Xu","year":"2020","unstructured":"Xu Y, Fang M, Wu ZG, Pan YJ, Chadli M, Huang T. Input-based event-triggering consensus of multiagent systems under denial-of-service attacks. IEEE Trans Systems Man Cybern Syst. 2020. https:\/\/doi.org\/10.1109\/TSMC.2018.2875250.","journal-title":"IEEE Trans Systems Man Cybern Syst"},{"key":"796_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.09.007","author":"J Wu","year":"2011","unstructured":"Wu J, Jiao L, Ding R. Average time synchronization in wireless sensor networks by pairwise messages. Comput Commun. 2011. https:\/\/doi.org\/10.1016\/j.comcom.2011.09.007.","journal-title":"Comput Commun"},{"key":"796_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2011.2182045","author":"MK Maggs","year":"2012","unstructured":"Maggs MK, O\u2019keefe SG, Thiel DV. Consensus clock synchronization for wireless sensor networks. IEEE Sens J. 2012. https:\/\/doi.org\/10.1109\/JSEN.2011.2182045.","journal-title":"IEEE Sens J"},{"issue":"24","key":"796_CR8","doi-asserted-by":"publisher","first-page":"6387","DOI":"10.1109\/TSP.2013.2286102","volume":"61","author":"J He","year":"2013","unstructured":"He J, Cheng P, Shi L, Chen J. SATS: secure average-consensus-based time synchronization in wireless sensor networks. IEEE Trans Signal Process. 2013;61(24):6387.","journal-title":"IEEE Trans Signal Process"},{"key":"796_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2015.2495147","author":"W Dong","year":"2015","unstructured":"Dong W, Liu X. Robust and secure time synchronization against Sybil attacks for sensor networks. IEEE Trans Ind Inform. 2015. https:\/\/doi.org\/10.1109\/tii.2015.2495147.","journal-title":"IEEE Trans Ind Inform"},{"key":"796_CR10","doi-asserted-by":"publisher","first-page":"2718","DOI":"10.3390\/s18082718","volume":"18","author":"Z Wang","year":"2018","unstructured":"Wang Z, Zeng P, Kong L, Li D, Jin X. Node-identification-based secure time synchronization in industrial wireless sensor networks. Sensors. 2018;18:2718. https:\/\/doi.org\/10.3390\/s18082718.","journal-title":"Sensors"},{"key":"796_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002577","author":"Y Wu","year":"2020","unstructured":"Wu Y, He X. Finite-time consensus-based clock synchronization under deception attacks. IEEE Access. 2020. https:\/\/doi.org\/10.1109\/ACCESS.2020.3002577.","journal-title":"IEEE Access"},{"key":"796_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2013.150","author":"J He","year":"2014","unstructured":"He J, Chen J, Cheng P, Cao X. Secure time synchronization in wireless sensor networks: a maximum consensus-based approach. IEEE Trans Parallel Distrib Syst. 2014. https:\/\/doi.org\/10.1109\/tpds.2013.150.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"796_CR13","doi-asserted-by":"publisher","first-page":"24","DOI":"10.3390\/jsan6040024","volume":"6","author":"AK Paul","year":"2017","unstructured":"Paul AK, Sato T. Localization in wireless sensor networks: a survey on algorithms, measurement techniques, applications and challenges. J Sens Actuator Netw. 2017;6:24. https:\/\/doi.org\/10.3390\/jsan6040024.","journal-title":"J Sens Actuator Netw"},{"key":"796_CR14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2013.0102(1stOctober2014)","author":"N Panigrahi","year":"2015","unstructured":"Panigrahi N, Khilar PM. Optimal consensus-based clock synchronisation algorithm in wireless sensor network by selective averaging. IET Wirel Sens Syst. 2015. https:\/\/doi.org\/10.1049\/iet-wss.2013.0102(1stOctober2014).","journal-title":"IET Wirel Sens Syst"},{"key":"796_CR15","doi-asserted-by":"crossref","unstructured":"Schenato L, Fiorentin F Average TimeSynch: A consensus-based protocol for clock synchronization in wireless sensor networks September 2011Automatica 47(9):1878-1886 DOI:10.1016\/j.automatica.2011.06.012","DOI":"10.1016\/j.automatica.2011.06.012"},{"key":"796_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.938757","author":"YC Wu","year":"2010","unstructured":"Wu YC, Chaudhari Q, Serpedin E. Clock synchronization of wireless sensor networks. IEEE Signal Process Mag. 2010. https:\/\/doi.org\/10.1109\/MSP.2010.938757.","journal-title":"IEEE Signal Process Mag"},{"key":"796_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/9780470666388","volume-title":"Fundamentals of wireless sensor networks: theory and practice","author":"W Dargie","year":"2010","unstructured":"Dargie W, Poellabauer C. Fundamentals of wireless sensor networks: theory and practice. New York: Wiley; 2010."},{"key":"796_CR18","doi-asserted-by":"publisher","first-page":"14744","DOI":"10.3390\/s140814744","volume":"14","author":"L Lin","year":"2014","unstructured":"Lin L, Ma S, Ma M. A group neighborhood average clock synchronization protocol for wireless sensor networks. Sensors. 2014;14:14744\u201364. https:\/\/doi.org\/10.3390\/s140814744.","journal-title":"Sensors"},{"key":"796_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/J.ADHOC.2019.101874","author":"SGH Rose","year":"2019","unstructured":"Rose SGH, Jayasree T. Detection of jamming attack using timestamp for WSN. Ad Hoc Netw. 2019. https:\/\/doi.org\/10.1016\/J.ADHOC.2019.101874.","journal-title":"Ad Hoc Netw"},{"key":"796_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161443","author":"J He","year":"2011","unstructured":"He J, Cheng P, Shi L, Chen J, Sun Y. Time synchronization in WSNs: a maximum-value-based consensus. IEEE Trans Autom Control. 2011. https:\/\/doi.org\/10.1109\/CDC.2011.6161443.","journal-title":"IEEE Trans Autom Control"},{"key":"796_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2016.2607119","author":"B Kailkhura","year":"2015","unstructured":"Kailkhura B, Brahma S, Varshney PK. Data falsification attacks on consensus-based detection systems. IEEE Trans Signal Process. 2015. https:\/\/doi.org\/10.1109\/TSIPN.2016.2607119.","journal-title":"IEEE Trans Signal Process"},{"key":"796_CR22","doi-asserted-by":"publisher","DOI":"10.1049\/PBCE096E_ch11","author":"W Abbas","year":"2016","unstructured":"Abbas W, Laszka A, Koutsoukos X. Resilient wireless sensor networks for cyber-physical systems. Cyber Phys Syst Design Sens Netw. 2016. https:\/\/doi.org\/10.1049\/PBCE096E_ch11.","journal-title":"Cyber Phys Syst Design Sens Netw"},{"key":"796_CR23","unstructured":"https:\/\/pymote.readthedocs.io\/en\/latest\/"},{"key":"796_CR24","doi-asserted-by":"publisher","unstructured":"Liu Q, Ren X, Mo Y\u00a0 Secure and privacy-preserving average consensus. CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCyNovember 2017 Pages 123\u2013129. https:\/\/doi.org\/10.1145\/3140241.3140243","DOI":"10.1145\/3140241.3140243"},{"key":"796_CR25","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0698-x","author":"R Hossain","year":"2016","unstructured":"Hossain R, Khan MI. Efficient consensus algorithm for the accurate faulty node tracking with faster convergence rate in a distributed sensor network. EURASIP J Wirel Commun Netw. 2016. https:\/\/doi.org\/10.1186\/s13638-016-0698-x.","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"796_CR26","unstructured":"http:\/\/www2.ece.ohio-state.edu\/~bibyk\/ee582\/telosMote.pdf. http:\/\/www.memsic.com\/userfiles\/files\/Datasheets\/WSN\/telosbdatasheet.pdf"},{"key":"796_CR27","unstructured":"Zhao C, He J, Cheng P, Chen J Secure consensus against message manipulation attacks in synchronous networks. Preprints of the 19th World Congress The International Federation of Automatic Control Cape Town, South Africa. August 24\u201329, 2014 \u00a0"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00796-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-021-00796-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00796-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,30]],"date-time":"2021-08-30T18:19:42Z","timestamp":1630347582000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-021-00796-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,13]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["796"],"URL":"https:\/\/doi.org\/10.1007\/s42979-021-00796-1","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"value":"2662-995X","type":"print"},{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,13]]},"assertion":[{"value":"15 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"409"}}