Advances in Information Security
DOI: 10.1007/978-0-387-46276-9_15
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Resilient Time Synchronization in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
92
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 58 publications
(92 citation statements)
references
References 47 publications
0
92
0
Order By: Relevance
“…Existing implementations of secure clock synchronization protocols [22,21,9,8,15,10,19] are not self-stabilizing. Thus, their specifications are not compatible with security requirements for autonomous systems.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Existing implementations of secure clock synchronization protocols [22,21,9,8,15,10,19] are not self-stabilizing. Thus, their specifications are not compatible with security requirements for autonomous systems.…”
Section: Discussionmentioning
confidence: 99%
“…In [22], the authors explain how to implement a secure clock synchronization protocol. Although the protocol is not self-stabilizing, we believe that some of their security primitives could be used in a self-stabilizing manner when implementing our self-stabilizing algorithm.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations