{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T17:29:54Z","timestamp":1772213394408,"version":"3.50.1"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2008,7,1]],"date-time":"2008-07-01T00:00:00Z","timestamp":1214870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2008,7]]},"abstract":"<jats:p>Time synchronization is critical in sensor networks at many layers of their design. It enables better duty-cycling of the radio, accurate and secure localization, beamforming, and other collaborative signal processing tasks. These benefits make time-synchronization protocols a prime target of malicious adversaries who want to disrupt the normal operation of a sensor network. In this article, we analyze attacks on existing time synchronization protocols for wireless sensor networks and we propose a secure time synchronization toolbox to counter these attacks. This toolbox includes protocols for secure pairwise and group synchronization of nodes that either lie in the neighborhood of each other or are separated by multiple hops. We provide an in-depth analysis of the security and the energy overhead of the proposed protocols. The efficiency of these protocols has been tested through an experimental study on Mica2 motes.<\/jats:p>","DOI":"10.1145\/1380564.1380571","type":"journal-article","created":{"date-parts":[[2008,8,5]],"date-time":"2008-08-05T13:35:10Z","timestamp":1217943310000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["Secure Time Synchronization in Sensor Networks"],"prefix":"10.1145","volume":"11","author":[{"given":"Saurabh","family":"Ganeriwal","sequence":"first","affiliation":[{"name":"University of California, Los Angeles"}]},{"given":"Christina","family":"P\u00f6pper","sequence":"additional","affiliation":[{"name":"ETH Zurich"}]},{"given":"Srdjan","family":"\u010capkun","sequence":"additional","affiliation":[{"name":"ETH Zurich"}]},{"given":"Mani B.","family":"Srivastava","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles"}]}],"member":"320","published-online":{"date-parts":[[2008,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01187072"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT'93)","author":"Brands S."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy (SP'03)","author":"Chan H."},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the IEEE CAS Workshop (CCAS'02)","author":"Deb B."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 2nd  IEEE International Workshop on Information Processing in Sensor Networks (IPSN'03)","author":"Deng J."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(86)90028-0"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Dolev D. and Yao A. 1981. On the security of public key protocols. Tech. rep. Stanford CA. Dolev D. and Yao A. 1981. On the security of public key protocols. Tech. rep. Stanford CA.","DOI":"10.1109\/SFCS.1981.32"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844143"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.100"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080809"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098933"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958508"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539794265232"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/941350.941353"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/800222.806739"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067188"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984653"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA'03)","author":"Karlof C."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2455.2457"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986869"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(84)80033-9"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/323596.323618"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102238"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031501"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.104"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS'02)","author":"Papadimitratos P."},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Perrig A. Canetti R. Tygar J. D. and Song D. 2002. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes 5 Summer. Perrig A. Canetti R. Tygar J. D. and Song D. 2002. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes 5 Summer.","DOI":"10.1007\/978-1-4615-0229-6_3"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287892"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_26"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the IEEE Wireless Communications and Networking Conference.","author":"Sichitiu M."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/28869.28876"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.36"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861396"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180439"},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Sundararaman B. Buy U. and A K. 2005. Clock Synchronization for Wireless Sensor Networks: A Survey. Tech. rep. March. Sundararaman B. Buy U. and A K. 2005. Clock Synchronization for Wireless Sensor Networks: A Survey. Tech. rep. March.","DOI":"10.1016\/j.adhoc.2005.01.002"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of IPSN Track on Sensor Platform, Tools and Design Methods for Networked Embedded Systems (SPOTS'05)","author":"Titzer B."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of IEEE Symposium on Security and Privacy (SP'03)","author":"Yaar A."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1380564.1380571","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1380564.1380571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:45Z","timestamp":1750255065000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1380564.1380571"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,7]]}},"alternative-id":["10.1145\/1380564.1380571"],"URL":"https:\/\/doi.org\/10.1145\/1380564.1380571","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,7]]},"assertion":[{"value":"2006-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}