|
[1] J. Elson and K. Romer, “Wireless Sensor Networks: A New Regime for Time Synchronization,” ACM SIGCOMM Computer Communication Review, vol. 33, no. 1, pp. 149–154, Jan. 2003. [2] J. Elson, L. Girod, and D. Estrin, “Fine-Grained Network Time Synchronization using Reference Broadcasts,” ACM SIGOPS Operating Systems Review, vol. 36, no. SI, pp. 147–163, Dec. 2002. [3] S. Ganeriwal, R. Kumar, and M. B. Srivastava, “Timing-sync Protocol for Sensor Networks,” in Proceedings of International Conference on Embedded Networked Sensor Systems, Nov. 2003, pp. 138–149. [4] M. Mar’oti, B. Kusy, G. Simon, and ’A. L’edeczi, “The Flooding Time Synchronization Protocol,” in Proceedings of International Conference on Embedded Networked Sensor Systems, Nov. 2004, pp. 39–49. [5] M. L. Sichitiu and C. Veerarittiphan, “Simple, Accurate Time Synchronization for Wireless Sensor Networks,” in Proceedings of IEEE Wireless Communications and Networking Conference, Mar. 2003, pp. 1266–1273. [6] W. Su and I. F. Akyildiz, “Time-Diffusion Synchronization Protocol for Wireless Sensor Networks,” IEEE Transactions on Networking, vol. 13, no. 2, pp. 384–397, Apr. 2005. [7] Q. Li and D. Rus, “Global Clock Synchronization in Sensor Networks,” IEEE Transactions on Comupters, vol. 55, no. 2, pp. 214–226, Feb. 2006. [8] G. Werner-Allen, G. Tewari, A. Patel, M. Welsh, and R. Nagpal, “Firefly-Inspired Sensor Network Synchronicity with Realistic Radio Effects,” in Proceedings of International Conference on Embedded Networked Sensor Systems, Nov. 2005, pp. 142–153. [9] M. Manzo, T. Roosta, and S. Sastry, “Time Synchronization Attacks in Sensor Networks,” in Proceedings of ACM workshop on Security of Ad Hoc and Sensor Networks, Nov. 2005, pp. 107–116. [10] K. Sun, P. Ning, and C. Wang, “Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks,” IEEE Transations on Dependable and Secure Computing, vol. 2, no. 3, pp. 177–189, July–Sept. 2005. [11] H. Song, S. Zhu, and G. Cao, “Attack-Resilient Time Synchronization for Wireless Sensor Networks,” in IEEE International Conference on Mobile Ad-hoc and Sesnor Systems, Nov. 2005, pp. 765–772. [12] S. Ganeriwal, S. Capkun, C.-C. Han, and M. B. Srivastava, “Secure Time Synchronization Service for Sensor Networks,” in Proceedings of ACM workshop on Wireless Security, Sept. 2005, pp. 97–106. [13] K. Sun, P. Ning, and C. Wang, “Secure and Resilient Clock Synchronization in Wireless Sensor Networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 395–408, Feb. 2006. [14] K. Sun, P. Ning, C. Wang, A. Liu, and Y. Zhou, “TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks,” in Proceedings of ACM Conference on Computer and Communications Security, Oct.–Nov. 2006, pp. 264–277. [15] B. Rosner, “Percentage Points for Generalized ESD Many-Outlier Procedure,” Technometrics, vol. 25, no. 2, pp. 165–172, May 1983. [16] A. Perrig, J. D. Tygar, D. Song, and R. Canetti, “Efficient Authentication and Signing of Multicast Streams over Lossy Channels,” in Proceedings of IEEE Symposium on Security and Privacy, May 2000, pp. 56–73. [17] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: Security Protocols for Sensor Networks,” in Proceedings of International Conference on Mobile Computing and Networks, July 2001, pp. 521–534. [18] M. Abramson and W. O. J. Moser, “More Birthday Surprises,” in American Mathematical Monthly, Oct. 1970, vol. 77, pp. 856–858. [19] The Network Simulator—ns-2. [Online]. Available: http://www.isi.edu/nsnam/ns/
|