Estimation Theory-Based Robust Phase Offset Determination in Presence of Possible Path Asymmetries
暂无分享,去创建一个
[1] Rick S. Blum,et al. Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.
[2] T. Mizrahi,et al. Slave diversity: Using multiple paths to improve the accuracy of clock synchronization protocols , 2012, 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings.
[3] Sencun Zhu,et al. Attack-resilient time synchronization for wireless sensor networks , 2007, Ad Hoc Networks.
[4] Rick S. Blum,et al. Minimax Optimum Estimators for Phase Synchronization in IEEE 1588 , 2015, IEEE Transactions on Communications.
[5] Yuguang Fang,et al. Teletraffic analysis and mobility modeling of PCS networks , 1999, IEEE Trans. Commun..
[6] Yik-Chung Wu,et al. Clock Synchronization of Wireless Sensor Networks , 2011, IEEE Signal Processing Magazine.
[7] Panganamala Ramana Kumar,et al. Fundamental Limits on Synchronizing Clocks Over Networks , 2011, IEEE Transactions on Automatic Control.
[8] David L. Mills,et al. Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..
[9] Peng Ning,et al. TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.
[10] G. Gaderer,et al. Security aspects for IEEE 1588 based clock synchronization protocols , 2006, 2006 IEEE International Workshop on Factory Communication Systems.
[11] Rick S. Blum,et al. On the Optimum Design of L-Estimators for Phase Offset Estimation in IEEE 1588 , 2015, IEEE Transactions on Communications.
[12] Yuguang Fang,et al. Hyper-Erlang Distribution Model and its Application in Wireless Mobile Networks , 2001, Wirel. Networks.
[13] Thilo Sauter,et al. Improving Fault Tolerance in High-Precision Clock Synchronization , 2010, IEEE Transactions on Industrial Informatics.
[14] Dennis R. Morgan,et al. A Synchronization Algorithm for Packet MANs , 2011, IEEE Transactions on Communications.
[15] Jeff A. Bilmes,et al. A gentle tutorial of the em algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models , 1998 .
[16] T. Mizrahi. A game theoretic analysis of delay attacks against time synchronization protocols , 2012, 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings.
[17] New York Dover,et al. ON THE CONVERGENCE PROPERTIES OF THE EM ALGORITHM , 1983 .
[18] Rick S. Blum,et al. Distributed joint spoofing attack identification and estimation in sensor networks , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[19] P. M. Melliar-Smith,et al. Synchronizing clocks in the presence of faults , 1985, JACM.
[20] G. Gaderer,et al. Clock synchronization in powerline networks , 2005, International Symposium on Power Line Communications and Its Applications, 2005..
[21] Saurabh Ganeriwal,et al. Timing-sync protocol for sensor networks , 2003, SenSys '03.
[22] H. Tijms. A First Course in Stochastic Models , 2003 .
[23] M. Ullmann,et al. Delay attacks — Implication on NTP and PTP time synchronization , 2009, 2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.