Robust regression and outlier detection
Robust regression and outlier detection
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
An Introduction to the Kalman Filter
An Introduction to the Kalman Filter
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Timing-sync protocol for sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Flexible power scheduling for sensor networks
Proceedings of the 3rd international symposium on Information processing in sensor networks
Sensor network-based countersniper system
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
The flooding time synchronization protocol
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Fine-grained network time synchronization using reference broadcasts
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Secure time synchronization service for sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Multiple simultaneous acoustic source localization in urban terrain
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection
Information Security Tech. Report
Information fusion for wireless sensor networks: Methods, models, and classifications
ACM Computing Surveys (CSUR)
CHEMAS: Identify suspect nodes in selective forwarding attacks
Journal of Parallel and Distributed Computing
Secure, accurate and precise time synchronization for wireless sensor networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Defense against outside attacks in wireless sensor networks
Computer Communications
Secure Time Synchronization in Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
BAP: Broadcast Authentication Using Cryptographic Puzzles
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Data aggregation in partially connected networks
Computer Communications
ACC'09 Proceedings of the 2009 conference on American Control Conference
International Journal of Systems, Control and Communications
A secure time synchronization protocol for sensor network
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Secure and self-stabilizing clock synchronization in sensor networks
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
Detecting selective forwarding attacks in wireless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Secure and self-stabilizing clock synchronization in sensor networks
Theoretical Computer Science
Secure time information in the internet key exchange protocol
Annales UMCS, Informatica - Security Systems
ESF: an efficient security framework for wireless sensor network
International Journal of Communication Networks and Distributed Systems
Detecting intrusive activities from insiders in a wireless sensor network using game theory
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments
Hi-index | 0.01 |
Time synchronization is a critical building block in distributed wireless sensor networks. Because sensor nodes may be severely resource-constrained, traditional time-synchronization protocols cannot be used in sensor networks. Various time-synchronization protocols tailored for such networks have been proposed to solve this problem. However, none of these protocols have been designed with security in mind. If an adversary were able to compromise a node, he might prevent a network from effectively executing certain applications, such as sensing or tracking an object, or he might even disable the network by disrupting a fundamental service such as a TDMA-based channel-sharing scheme. In this paper we give a survey of the most common time synchronization protocols and outline the possible attacks on each protocol. In addition, we discuss how different sensor network applications that are affected by time synchronization attacks, and we propose some countermeasures for these attack.