{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:25:34Z","timestamp":1725495934688},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770169"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77018-3_52","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T02:46:39Z","timestamp":1196045199000},"page":"515-526","source":"Crossref","is-referenced-by-count":7,"title":["A Secure Time Synchronization Protocol for Sensor Network"],"prefix":"10.1007","author":[{"given":"Hui","family":"Li","sequence":"first","affiliation":[]},{"given":"Yanfei","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Mi","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"52_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., et al.: Wireless sensor networks: a survey. Computer Networks\u00a038(4), C393\u2013C422 (2002)","journal-title":"Computer Networks"},{"issue":"10","key":"52_CR2","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/26.103043","volume":"39","author":"D. Mills","year":"1991","unstructured":"Mills, D.: Internet time synchronization: The network time protocol. IEEE Trans. Commun.,\u00a039(10), C1482\u2013C1493 (1991)","journal-title":"IEEE Trans. Commun.,"},{"key":"52_CR3","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Capkun, S., Han, C., Srivastava, M.B.: Secure time synchronization service for sensor networks. In: Proc. ACM Workshop on Wireless Security, September 2005, pp. C97\u2013C106.","DOI":"10.1145\/1080793.1080809"},{"key":"52_CR4","doi-asserted-by":"crossref","unstructured":"Manzo, M., Roosta, T., Sastry, S.: Time Synchronization Attacks in Sensor Networks. In: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 107\u2013116 (2005)","DOI":"10.1145\/1102219.1102238"},{"key":"52_CR5","doi-asserted-by":"crossref","unstructured":"Sun, K., Ning, P., Wang, C.: Secure and Resilient Clock Synchronization in Wireless Sensor Networks. IEEE Journal on selected areas in communications\u00a024 (2006)","DOI":"10.1109\/JSAC.2005.861396"},{"key":"52_CR6","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, R., Song, D., Perrig, A.: The sybil attack in sensor networks: Analysis and defenses. In: Proc. IEEE Int. Conf. Inf. Processing in Sensor Netw., pp. 259\u20132168 (April 2004)","DOI":"10.1145\/984622.984660"},{"key":"52_CR7","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/844128.844143","volume":"36","author":"J. Elson","year":"2002","unstructured":"Elson, J., Girod, L., Estrin, D.: Fine-Grained Network Time Synchronization Using Reference Broadcasts. ACM SIGOPS Operating Systems Rev.\u00a036, 147\u2013163 (2002)","journal-title":"ACM SIGOPS Operating Systems Rev."},{"key":"52_CR8","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Kumar, R., Srivastava, M.B.: Timing-Sync Protocol for Sensor Networks. In: Proc. First Intl. Conf. Embedded Networked Sensor Systems (SenSys) (2003)","DOI":"10.1145\/958491.958508"},{"key":"52_CR9","doi-asserted-by":"crossref","unstructured":"Hu, A., Servetto, S.D.: Asymptotically Optimal Time Synchronization in Dense Sensor Networks. In: Proc. Second ACM Intl. Workshop Wireless Sensor Networks and Applications (WSNA) (September 2003)","DOI":"10.1145\/941350.941352"},{"key":"52_CR10","unstructured":"Li, Q., Rus, D.: Global Clock Synchronization in Sensor Networks. In: Proc. IEEE INFOCOM 2004 Conf. (March 2004)"},{"key":"52_CR11","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. 10th ACM Conf. Compute. Commun. Security, pp. 52\u201361 (October 2003)","DOI":"10.1145\/948109.948119"},{"key":"52_CR12","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. IEEE Symp. Res. Security and Privacy, pp. C197\u2013C213 (2003)"},{"key":"52_CR13","doi-asserted-by":"crossref","unstructured":"Coleri, S., Varaiya, P.: Fault tolerance and energy efficiency of data aggregation schemes for sensor networks. In: IEEE VTC (September 2004)","DOI":"10.1109\/VETECF.2004.1400596"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77018-3_52.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:53:45Z","timestamp":1619506425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77018-3_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770169"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77018-3_52","relation":{},"subject":[]}}