|
[1] V. Paxson, “On calibrating measurements of packet transit times,” in Proc. ACM SIGMETRICS Conf., pp. 11–21, 1998. [2] S. Moon, P. Skelly, and D. Towsley, “Estimation and removal of clock skew from network delay measurements,” in Proc. INFOCOM Conf., pp. 227–234, 1999. [3] T. Kohno, A. Broido, and K. Claffy, “Remote physical device fingerprinting,” IEEE Trans. Dependable and Secure Computing, vol. 2, no. 2, pp. 93–108, 2005. [4] J. Bi, Q. Wu, and Z. Li, “On estimating clock skew for one-way measurements,” Comput. Commun., vol. 29, pp. 1213–1225, May 2006. [5] H. Khlifi and J. Grégoire, “Low-complexity offline and online clock skew estimation and removal,” Comput. Networks, vol. 50, pp. 1872–1884, Aug. 2006. [6] M. Aoki, E. Oki, and R. Rojas-Cessa, “Measurement scheme for one-way delay variation with detection and removal of clock skew,” ETRI J., vol. 32, pp. 854–862, Dec. 2010. [7] S. Murdoch, “Hot or not: revealing hidden services by their clock skew,” in Proc. 13th ACM Conf. Comput. and Commun. Security, pp. 27–36, 2006. [8] S. Zander and S. Murdoch, “An improved clock-skew measurement technique for revealing hidden services,” in Proc. 17th Conf. Security Symp., pp. 211–225, 2008. [9] D.-J. Huang, W.-C. Teng, C.-Y. Wang, H.-Y. Huang, and J. M. Hellerstein, “Clock skew based node identification in wireless sensor networks,” in IEEE Global Telecommun. Conf. (GLOBECOM), 2008. [10] D.-J. Huang and W.-C. Teng, “A defense against clock skew replication attacks in wireless sensor networks,” J. Network and Comput. Applicat., vol. 39, pp. 26–37, Mar. 2014. [11] D.-J. Huang, W.-C. Teng, and K.-T. Yang, “Secured flooding time synchronization protocol with moderator,” Int. J. Commun. Syst., vol. 26, no. 9, pp. 1092–1115, 2013. [12] X. Mei, D. Liu, K. Sun, and D. Xu, “On feasibility of fingerprinting wireless sensor nodes using physical properties,” in 27th IEEE Int. Symp. Parallel and Distributed Process. (IPDPS), pp. 1112– 1121, May 2013. [13] M. B. Uddin and C. Castelluccia, “Toward clock skew based wireless sensor node services,” in 5th Annu. ICST Wireless Internet Conf. (WICON), pp. 1–9, 2010. [14] C. Arackaparambil and S. Bratus, “On the reliability of wireless fingerprinting using clock skews,” in Proc. 3rd ACM Conf. Wireless Network Security, pp. 169–174, 2010. [15] S. Jana and S. Kasera, “On fast and fccurate detection of unauthorized wireless access points using clock skews,” IEEE Trans. Mobile Comput., vol. 9, pp. 449–462, Mar. 2010. [16] D.-J. Huang, K.-T. Yang, C.-C. Ni, W.-C. Teng, T.-R. Hsiang, and Y.-J. Lee, “Clock skew based client device identification in cloud environments,” in 26th IEEE Int. Conf. Advanced Inform. Networking and Applicat. (AINA), pp. 526–533, Mar. 2012. [17] S. Sharma, H. Saran, and S. Bansal, “An Empirical study of clock skew behavior in modern mobile and hand-held devices,” in 3rd Int. Conf. Commun. Syst. and Networks (COMSNETS), pp. 1–4, Jan. 2011. [18] S. Sharma, A. Hussain, and H. Saran, “Experience with heterogenous clock-skew based device fingerprinting,” in Proc. LASER Workshop, pp. 9–18, 2012. [19] M. Cristea and B. Groza, “Fingerprinting smartphones remotely via ICMP timestamps,” IEEE Commun. Lett., vol. 17, pp. 1081–1083, June 2013. [20] L. Polcák, J. Jirásek, and P. Matousek, “Comment on ”Remote Physical Device Fingerprinting”,” IEEE Trans. Dependable and Secure Computing, vol. 11, pp. 494–496, 2014. [21] R. O. Duda and P. E. Hart, “Use of the Hough transformation to detect lines and curves in pictures,” Commun. ACM, vol. 15, pp. 11–15, Jan. 1972. [22] P. Hart, “How the Hough transform was invented,” IEEE Signal Process. Mag., vol. 26, no. 6, pp. 18– 22, 2009. [23] Z.-H. Chen, A. W. Y. Su, and M.-T. Sun, “Resource-efficient FPGA architecture and implementation of Hough Transform,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 20, pp. 1419–1428, Aug. 2012. [24] B. W. Silverman, “Using kernel density estimates to investigate multimodality,” Journal of the Royal Statistical Society: Series B, vol. 43, pp. 97–99, 1989. [25] J. A. Hartigan and P. M. Hartigan, “The dip test of unimodality,” The Annals of Statistics, vol. 13, pp. 70–84, 1985. [26] G. McLachlan and D. Peel, Finite Mixture Models. Hoboken, NJ: Wiley, 2000. [27] J. Freeman and R. Dale, “Assessing bimodality to detect the presence of a dual cognitive process,” Behaviour Research Method, vol. 45, pp. 56–62, July 2013. [28] F. Melcher, “Hartigan’s Dip Statistic.” http://www.nicprice.net/diptest/. Accesed: 2016-5- 15. [29] N. Otsu, “A threshold selection method from gray-level histograms,” IEEE Trans. Sys., Man., Cyber., vol. 9, no. 1, pp. 62–66, 1979. [30] A. Greensted, “Otsu Thresholding.” http://www.labbookpages.co.uk/software/imgProc/ otsuThreshold.html. Accesed: 2016-5-15. [31] T. E. Abrudan, A. Haghparast, and V. Koivunen, “Time synchronization and ranging in OFDM systems using time-reversal,” IEEE Trans. Instrum. Meas., vol. 62, pp. 3276–3290, Dec. 2013. [32] T. Cooklev, J. C. Eidson, and A. Pakdaman, “An implementation of IEEE 1588 over IEEE 802.11b for synchronization of wireless local area network nodes,” IEEE Trans. Instrum. Meas., vol. 56, no. 5, pp. 1632–1639, 2007. [33] C. D. Dominicis and P. Pivato, “Timestamping of IEEE 802.15.4a CSS signals for wireless ranging and time synchronization,” IEEE Trans. Instrum. Meas., vol. 62, no. 8, pp. 2286–2296, 2013. [34] A. Vakili and J.-c. Grégoire, “Accurate one-way delay estimation: limitations and improvements,” IEEE Trans. Instrum. Meas., vol. 61, no. 9, pp. 2428–2435, 2012. [35] K. Zeng, K. Govindan, and P. Mohapatra, “Non-cryptographic authentication and identification in wireless networks,” IEEE Wireless Commun., vol. 17, no. 5, pp. 56–62, 2010. [36] L. Zhang, Z. Liu, and C. H. Xia, “Clock synchronization algorithms for network measurements,” in Proc. INFOCOM Conf., pp. 160–169, 2002. [37] S. Johannessen, “Time synchronization in a local area network,” IEEE Control Systems, vol. 24, pp. 61–69, Apr. 2004. [38] Y.-C. Wu, Q. Chaudhari, and E. Serpedin, “Clock synchronization of wireless sensor networks,” IEEE Signal Proc. Magazine, vol. 28, pp. 124–138, Jan. 2011. [39] L. De Vito, S. Rapuano, and L. Tomaciello, “One-way delay measurement: state of the art,” IEEE Trans. Instrum. Meas., vol. 57, pp. 2742–2750, Dec. 2008. [40] A. Vakili and J.-C. Gregoire, “Accurate one-way delay estimation: limitations and improvements,” IEEE Trans. Instrum. Meas., vol. 61, pp. 2428–2435, Sept. 2012. [41] C. D. Dominicis, P. Ferrari, A. Flammini, and E. Sisinni, “Wireless sensors exploiting IEEE802.15.4a for precise timestamping,” in Proc. ISPCS 2010 Conf., pp. 48–54, 2010. [42] W. Dong and X. Liu, “Robust and secure time-synchronization against sybil attacks for sensor networks,” IEEE Trans. Industrial Informatics, vol. 11, pp. 1482–1491, Dec. 2015. [43] A. Boukerche and D. Turgut, “Secure time synchronization protocols for wireless sensor networks,” IEEE Wireless Commun., vol. 14, pp. 64–69, Oct. 2007. P. Ferrari, G. Giorgi, C. Narduzzi, S. Rinaldi, and M. Rizzi, “Timestamp validation strategy for wireless sensor networks based on IEEE 802.15.4 CSS,” IEEE Trans. Instrum. Meas., vol. 63, no. 11, pp. 2512– 2521, 2014. [45] T. Cooklev, J. C. Eidson, and A. Pakdaman, “An implementation of IEEE 1588 over IEEE 802.11b for synchronization of wireless local area network nodes,” IEEE Trans. Instrum. Meas., vol. 56, no. 5, pp. 1632–1639, 2007. [46] K. Oka Saputra, W.-C. Teng, and P.-Y. Chou, “A study of regular transmission delay in bluetooth communications,” in Proc. of the 3rd International Conf. on Intelligent Technologies and Engineering Systems (ICITES), pp. 301–307, 2014. [47] K. Oka Saputra, W.-C. Teng, and T.-H. Chen, “Hough transform-based clock skew measurement over network,” IEEE Trans. Instrum. Meas., vol. 64, Dec. 2015. [48] K. Oka Saputra, W.-C. Teng, and Y.-H. Chu, “A clock ckew replication attack detection approach utilizing the resolution of system time,” in Proc. 2015 IEEE/WIC/ACM International Conf. on Web Intelligence and Intelligent Agent Technology, pp. 211–214, 2015. [49] K. Oka Saputra, W.-C. Teng, and T. Nara, “Hough transform-based clock skew measurement by dinamically locating the region of offsets majority,” IEICE Trans. Inf. and Syst., 2016. To appear in print.
|