Team for Research in
Ubiquitous Secure Technology

Time Synchronization Attacks in Sensor Networks
Tanya Roosta, Mike Manzo, Shankar Sastry

Citation
Tanya Roosta, Mike Manzo, Shankar Sastry. "Time Synchronization Attacks in Sensor Networks". Poovendran, Wang, Roy (eds.), 30, Springer, 2007.

Abstract
In this chapter, we review time synchronization attacks in wireless sensor networks. We will first consider three of the main time synchronization protocols in sensor network in sections. In section we discuss applications of time synchronization in sensor networks. In section we analyze possible security attacks on the existing time synchronization protocols. In section we examine how different sensor network applications are affected by time synchronization attacks. Finally in section we propose possible countermeasures to secure the time synchronization protocols.

Electronic downloads


Internal. This publication has been marked by the author for TRUST-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Tanya Roosta, Mike Manzo, Shankar Sastry. <a
    href="http://www.truststc.org/pubs/232.html"
    ><i>Time Synchronization Attacks in Sensor
    Networks</i></a>, Poovendran, Wang, Roy (eds.),
    30, Springer, 2007.
  • Plain text
    Tanya Roosta, Mike Manzo, Shankar Sastry. "Time
    Synchronization Attacks in Sensor Networks".
    Poovendran, Wang, Roy (eds.), 30, Springer, 2007.
  • BibTeX
    @inbook{RoostaManzoSastry07_TimeSynchronizationAttacksInSensorNetworks,
        author = {Tanya Roosta and Mike Manzo and Shankar Sastry},
        editor = {Poovendran, Wang, Roy},
        title = {Time Synchronization Attacks in Sensor Networks},
        volume = {30},
        publisher = {Springer},
        year = {2007},
        abstract = {In this chapter, we review time synchronization
                  attacks in wireless sensor networks. We will first
                  consider three of the main time synchronization
                  protocols in sensor network in sections. In
                  section we discuss applications of time
                  synchronization in sensor networks. In section we
                  analyze possible security attacks on the existing
                  time synchronization protocols. In section we
                  examine how different sensor network applications
                  are affected by time synchronization attacks.
                  Finally in section we propose possible
                  countermeasures to secure the time synchronization
                  protocols.},
        URL = {http://www.truststc.org/pubs/232.html}
    }
    

Posted by Tanya Roosta on 22 Mar 2007.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.