Entry Ganeriwal:2008:STS from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Ganeriwal:2008:STS,
  author =       "Saurabh Ganeriwal and Christina P{\"o}pper and Srdjan
                 {\v{C}}apkun and Mani B. Srivastava",
  title =        "Secure Time Synchronization in Sensor Networks",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "4",
  pages =        "23:1--23:??",
  month =        jul,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1380564.1380571",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Aug 5 19:37:22 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Time synchronization is critical in sensor networks at
                 many layers of their design. It enables better
                 duty-cycling of the radio, accurate and secure
                 localization, beamforming, and other collaborative
                 signal processing tasks. These benefits make
                 time-synchronization protocols a prime target of
                 malicious adversaries who want to disrupt the normal
                 operation of a sensor network. In this article, we
                 analyze attacks on existing time synchronization
                 protocols for wireless sensor networks and we propose a
                 secure time synchronization toolbox to counter these
                 attacks. This toolbox includes protocols for secure
                 pairwise and group synchronization of nodes that either
                 lie in the neighborhood of each other or are separated
                 by multiple hops. We provide an in-depth analysis of
                 the security and the energy overhead of the proposed
                 protocols. The efficiency of these protocols has been
                 tested through an experimental study on Mica2 motes.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "delay; message authentication code; sensor networks;
                 time synchronization",
}

Related entries