Toward clock skew based wireless sensor node services
暂无分享,去创建一个
[1] Nimrod Megiddo,et al. Linear-time algorithms for linear programming in R3 and related problems , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[2] Mani Mina,et al. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.
[3] Philip Levis,et al. TinyOS Programming: Introduction , 2009 .
[4] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] David L. Mills,et al. Network Time Protocol (Version 3) Specification, Implementation , 1992 .
[6] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[7] Sebastian Zander,et al. An Improved Clock-skew Measurement Technique for Revealing Hidden Services , 2008, USENIX Security Symposium.
[8] Joseph M. Hellerstein,et al. Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[9] Alexander S. Szalay,et al. Sundial: Using Sunlight to Reconstruct Global Timestamps , 2009, EWSN.
[10] David E. Culler,et al. The nesC language: A holistic approach to networked embedded systems , 2003, PLDI.
[11] Donald F. Towsley,et al. Estimation and removal of clock skew from network delay measurements , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[12] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[13] Nimrod Megiddo,et al. Linear-Time Algorithms for Linear Programming in R^3 and Related Problems , 1982, FOCS.
[14] Steven J. Murdoch,et al. Hot or not: revealing hidden services by their clock skew , 2006, CCS '06.
[15] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[16] Vern Paxson,et al. On calibrating measurements of packet transit times , 1998, SIGMETRICS '98/PERFORMANCE '98.
[17] Joshua Wright,et al. Detecting Wireless LAN MAC Address Spoofing , 2003 .
[18] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[19] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[20] Surendar Chandra,et al. PAST: Probabilistic Authentication of Sensor Timestamps , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[21] Martin E. Dyer,et al. Linear Time Algorithms for Two- and Three-Variable Linear Programs , 1984, SIAM J. Comput..