2014
DOI: 10.2495/icct20131131
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of delay attacks based on game theory in time synchronization protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The red nodes indicate malicious node in Figure 3 . The evaluation will compare three schemes: CEACM-TS, APAC [ 9 ] and GTMS (Group based trust management scheme) [ 8 ], to show that CEACM-TS is a practical design for the tradeoff between keeping out of the interference and transmitting concurrently, comparing their advantages and disadvantages in terms of random packet losses, error packets, data tampering and retransmission, falsification of identity, denial of service, node capture resetting as well as system cost, energy consumption evaluation and error rate of access control test under the condition of simulative human disturbances and attacks. This topology structure is composed of two backbone networks which contains the cluster head node and sensor nodes.…”
Section: Performance Analysis and Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The red nodes indicate malicious node in Figure 3 . The evaluation will compare three schemes: CEACM-TS, APAC [ 9 ] and GTMS (Group based trust management scheme) [ 8 ], to show that CEACM-TS is a practical design for the tradeoff between keeping out of the interference and transmitting concurrently, comparing their advantages and disadvantages in terms of random packet losses, error packets, data tampering and retransmission, falsification of identity, denial of service, node capture resetting as well as system cost, energy consumption evaluation and error rate of access control test under the condition of simulative human disturbances and attacks. This topology structure is composed of two backbone networks which contains the cluster head node and sensor nodes.…”
Section: Performance Analysis and Experimental Resultsmentioning
confidence: 99%
“…Following that, the base station periodically multicasts the current state of each group to all group heads. The information encryption access technology can guarantee the integrity and confidentiality of the information packet and can effectively resist external attacks but it cannot guarantee time accuracy [ 9 ]. The Fault Tolerant Time Synchronization Protocol (FTTSP) judges and detects the internal noise of the node based on the difference between the estimated value of the transmission time and the actual value by with fault-tolerance mechanism [ 10 ].…”
Section: Introductionmentioning
confidence: 99%