Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks 2005
DOI: 10.1145/1102219.1102238
|View full text |Cite
|
Sign up to set email alerts
|

Time synchronization attacks in sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 96 publications
(57 citation statements)
references
References 11 publications
0
57
0
Order By: Relevance
“…To do that, a time synchronization protocol is needed, using reference broadcasts. Such protocols have been shown to be susceptible to attacks [17] and securing them will require even more of the mote's resources.…”
Section: Biometric Methodsmentioning
confidence: 99%
“…To do that, a time synchronization protocol is needed, using reference broadcasts. Such protocols have been shown to be susceptible to attacks [17] and securing them will require even more of the mote's resources.…”
Section: Biometric Methodsmentioning
confidence: 99%
“…In this section, we describe the possible countermeasures for time synchronization attacks in both single-hop and multihop networks [12]. In single-hop networks, transmission range of each node reaches to every other node in the network.…”
Section: Countermeasures For the Attacksmentioning
confidence: 99%
“…Manzo et. al [12] propose the use of the Least Mean Squares (LMS) estimator for a more robust modelling. The generalized extreme studentized deviate (GESD) used by…”
Section: Approaches For Secure Time Synchronizationmentioning
confidence: 99%
“…Existing implementations of secure clock synchronization protocols [22,21,9,8,15,10,19] are not self-stabilizing. Thus, their specifications are not compatible with security requirements for autonomous systems.…”
Section: Discussionmentioning
confidence: 99%
“…Manzo et al [15] describe several possible attacks on an (unsecured) clock synchronization algorithm and suggest counter measures. For single hop synchronization, the authors suggest using a randomly selected "core" of nodes to minimize the effect of captured nodes.…”
Section: Discussionmentioning
confidence: 99%