{"id":"https://openalex.org/W3035463394","doi":"https://doi.org/10.1109/access.2020.3002577","title":"Finite-Time Consensus-Based Clock Synchronization Under Deception Attacks","display_name":"Finite-Time Consensus-Based Clock Synchronization Under Deception Attacks","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3035463394","doi":"https://doi.org/10.1109/access.2020.3002577","mag":"3035463394"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3002577","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3002577","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09117119.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09117119.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047431460","display_name":"Yiming Wu","orcid":"https://orcid.org/0000-0001-9766-2307"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yiming Wu","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-9766-2307","affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013584546","display_name":"Xiongxiong He","orcid":"https://orcid.org/0000-0002-5806-1047"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiongxiong He","raw_affiliation_strings":["College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-5806-1047","affiliations":[{"raw_affiliation_string":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5047431460"],"corresponding_institution_ids":["https://openalex.org/I50760025"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.7813,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.85977577,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"8","issue":null,"first_page":"110748","last_page":"110758"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.7557992935180664},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.6973434686660767},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.680363655090332},{"id":"https://openalex.org/keywords/clock-synchronization","display_name":"Clock synchronization","score":0.6233727931976318},{"id":"https://openalex.org/keywords/time-synchronization","display_name":"Time synchronization","score":0.5279713273048401},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4597274661064148},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24169939756393433},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07355767488479614},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.061796635389328}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.7557992935180664},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.6973434686660767},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.680363655090332},{"id":"https://openalex.org/C129891060","wikidata":"https://www.wikidata.org/wiki/Q1513059","display_name":"Clock synchronization","level":4,"score":0.6233727931976318},{"id":"https://openalex.org/C2986737936","wikidata":"https://www.wikidata.org/wiki/Q1058791","display_name":"Time synchronization","level":2,"score":0.5279713273048401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4597274661064148},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24169939756393433},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07355767488479614},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.061796635389328},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.3002577","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3002577","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09117119.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5aea664ac63848ce9a34bc57b8f821e4","is_oa":true,"landing_page_url":"https://doaj.org/article/5aea664ac63848ce9a34bc57b8f821e4","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 110748-110758 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3002577","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3002577","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09117119.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2288096680","display_name":null,"funder_award_id":"61873239","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2954797384","display_name":null,"funder_award_id":"2016YFB0800201","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4272018260","display_name":null,"funder_award_id":"61803135","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3035463394.pdf","grobid_xml":"https://content.openalex.org/works/W3035463394.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W1884770762","https://openalex.org/W1973184571","https://openalex.org/W1977593651","https://openalex.org/W1993423039","https://openalex.org/W2011398665","https://openalex.org/W2017249178","https://openalex.org/W2018093989","https://openalex.org/W2032803680","https://openalex.org/W2046389872","https://openalex.org/W2058533888","https://openalex.org/W2060606322","https://openalex.org/W2068683239","https://openalex.org/W2079012599","https://openalex.org/W2097183540","https://openalex.org/W2099175737","https://openalex.org/W2099586295","https://openalex.org/W2108970807","https://openalex.org/W2133940231","https://openalex.org/W2135964114","https://openalex.org/W2148417885","https://openalex.org/W2165025360","https://openalex.org/W2165469059","https://openalex.org/W2171436899","https://openalex.org/W2227410585","https://openalex.org/W2300802593","https://openalex.org/W2460773313","https://openalex.org/W2607930369","https://openalex.org/W2608867620","https://openalex.org/W2609955506","https://openalex.org/W2742338859","https://openalex.org/W2774634402","https://openalex.org/W2789972853","https://openalex.org/W2799947113","https://openalex.org/W2802534903","https://openalex.org/W2883960023","https://openalex.org/W2914337463","https://openalex.org/W2921500732","https://openalex.org/W2939578265","https://openalex.org/W2962736620","https://openalex.org/W3104140780","https://openalex.org/W4244300861","https://openalex.org/W6670099704","https://openalex.org/W6674874901","https://openalex.org/W6685024719"],"related_works":["https://openalex.org/W2187730212","https://openalex.org/W2885105415","https://openalex.org/W4312714696","https://openalex.org/W2166939931","https://openalex.org/W2548702785","https://openalex.org/W2130974576","https://openalex.org/W4231087120","https://openalex.org/W2031096545","https://openalex.org/W1986532039","https://openalex.org/W2356054222"],"abstract_inverted_index":{"This":[0],"paper":[1],"concentrates":[2],"on":[3],"the":[4,37,40,54,58,61,89,96,101,108,123,126],"finite-time":[5],"clock":[6],"synchronization":[7,109],"problem":[8],"for":[9,64,113],"wireless":[10],"sensor":[11],"networks":[12],"(WSNs)":[13],"under":[14],"deception":[15,65],"attacks.":[16],"Compared":[17],"with":[18,45,80],"adding":[19],"additional":[20],"communication":[21],"links":[22,52],"to":[23,35,121],"a":[24,28,49],"network,":[25,41],"we":[26],"introduce":[27],"new":[29],"mechanism":[30,84],"termed":[31],"as":[32,53],"\u201ctrusted":[33],"link\u201d":[34],"improve":[36],"resilience":[38],"of":[39,51,125],"and":[42,91],"show":[43],"that":[44],"small":[46],"changes":[47],"(set":[48],"fraction":[50],"trusted":[55],"links)":[56],"in":[57],"network":[59,62],"structure":[60],"robustness":[63,92],"attacks":[66],"can":[67],"be":[68],"improved":[69],"significantly.":[70],"Then,":[71],"an":[72],"iterative":[73],"learning":[74],"control":[75,78],"based":[76],"consensus":[77],"methodology":[79],"built-in":[81],"attack":[82],"mitigation":[83],"is":[85,104],"proposed.":[86],"Not":[87],"only":[88],"security":[90],"are":[93,119],"guaranteed":[94],"by":[95],"proposed":[97],"controller,":[98],"but":[99],"also":[100],"convergence":[102],"time":[103],"fixed,":[105],"which":[106],"makes":[107],"algorithm":[110],"more":[111],"suitable":[112],"practical":[114],"WSNs.":[115],"Finally,":[116],"simulation":[117],"results":[118],"provided":[120],"demonstrate":[122],"effectiveness":[124],"theoretical":[127],"results.":[128]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
