{"id":"https://openalex.org/W2152045673","doi":"https://doi.org/10.1109/comsnets.2011.5716494","title":"An Empirical study of clock skew behavior in modern mobile and hand-held devices","display_name":"An Empirical study of clock skew behavior in modern mobile and hand-held devices","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2152045673","doi":"https://doi.org/10.1109/comsnets.2011.5716494","mag":"2152045673"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets.2011.5716494","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2011.5716494","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057454224","display_name":"Swati Sharma","orcid":"https://orcid.org/0000-0002-5595-6574"},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S Sharma","raw_affiliation_strings":["Computer Science & Engineering Department, Indian Institute of Technology, New Delhi, India"],"affiliations":[{"raw_affiliation_string":"Computer Science & Engineering Department, Indian Institute of Technology, New Delhi, India","institution_ids":["https://openalex.org/I68891433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060599858","display_name":"Huzur Saran","orcid":null},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"H Saran","raw_affiliation_strings":["Computer Science & Engineering Department, Indian Institute of Technology, New Delhi, India"],"affiliations":[{"raw_affiliation_string":"Computer Science & Engineering Department, Indian Institute of Technology, New Delhi, India","institution_ids":["https://openalex.org/I68891433"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048218106","display_name":"Saurabh Bansal","orcid":"https://orcid.org/0000-0002-0574-4063"},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S Bansal","raw_affiliation_strings":["Computer Science & Engineering Department, Indian Institute of Technology, New Delhi, India"],"affiliations":[{"raw_affiliation_string":"Computer Science & Engineering Department, Indian Institute of Technology, New Delhi, India","institution_ids":["https://openalex.org/I68891433"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057454224"],"corresponding_institution_ids":["https://openalex.org/I68891433"],"apc_list":null,"apc_paid":null,"fwci":1.761,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.87681914,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.784524142742157},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6553208827972412},{"id":"https://openalex.org/keywords/clock-skew","display_name":"Clock skew","score":0.5831806063652039},{"id":"https://openalex.org/keywords/ip-address-spoofing","display_name":"IP address spoofing","score":0.557831883430481},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5571044087409973},{"id":"https://openalex.org/keywords/protocol-stack","display_name":"Protocol stack","score":0.555624783039093},{"id":"https://openalex.org/keywords/skew","display_name":"Skew","score":0.5513878464698792},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.4755822420120239},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4571928083896637},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4515692889690399},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4485345482826233},{"id":"https://openalex.org/keywords/flagging","display_name":"Flagging","score":0.43931061029434204},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4226510226726532},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.38097327947616577},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3409070074558258},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.33409810066223145},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.3181428909301758},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.25573208928108215},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.23843327164649963},{"id":"https://openalex.org/keywords/jitter","display_name":"Jitter","score":0.13477370142936707},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11133408546447754},{"id":"https://openalex.org/keywords/ip-address-management","display_name":"IP address management","score":0.09990653395652771},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09451115131378174}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.784524142742157},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6553208827972412},{"id":"https://openalex.org/C60501442","wikidata":"https://www.wikidata.org/wiki/Q4382014","display_name":"Clock skew","level":4,"score":0.5831806063652039},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.557831883430481},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5571044087409973},{"id":"https://openalex.org/C38601921","wikidata":"https://www.wikidata.org/wiki/Q1757693","display_name":"Protocol stack","level":3,"score":0.555624783039093},{"id":"https://openalex.org/C43711488","wikidata":"https://www.wikidata.org/wiki/Q7534783","display_name":"Skew","level":2,"score":0.5513878464698792},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.4755822420120239},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4571928083896637},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4515692889690399},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4485345482826233},{"id":"https://openalex.org/C2777548347","wikidata":"https://www.wikidata.org/wiki/Q5456937","display_name":"Flagging","level":2,"score":0.43931061029434204},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4226510226726532},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.38097327947616577},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3409070074558258},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.33409810066223145},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.3181428909301758},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25573208928108215},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.23843327164649963},{"id":"https://openalex.org/C134652429","wikidata":"https://www.wikidata.org/wiki/Q1052698","display_name":"Jitter","level":2,"score":0.13477370142936707},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11133408546447754},{"id":"https://openalex.org/C201980515","wikidata":"https://www.wikidata.org/wiki/Q13219707","display_name":"IP address management","level":4,"score":0.09990653395652771},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09451115131378174},{"id":"https://openalex.org/C137059387","wikidata":"https://www.wikidata.org/wiki/Q426882","display_name":"Clock signal","level":3,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/comsnets.2011.5716494","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2011.5716494","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.715.2381","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.715.2381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cse.iitd.ernet.in/%7Esbansal/pubs/clockskew.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W77476586","https://openalex.org/W1510900102","https://openalex.org/W1877705782","https://openalex.org/W1981870545","https://openalex.org/W2024045435","https://openalex.org/W2104271238","https://openalex.org/W2104599106","https://openalex.org/W2127133592","https://openalex.org/W2165572597","https://openalex.org/W2171769417","https://openalex.org/W6603188462","https://openalex.org/W6630491312","https://openalex.org/W6685479035"],"related_works":["https://openalex.org/W1978185930","https://openalex.org/W2360631891","https://openalex.org/W1976066853","https://openalex.org/W2342553505","https://openalex.org/W2051979939","https://openalex.org/W4312366226","https://openalex.org/W2089278933","https://openalex.org/W2000155568","https://openalex.org/W2348219379","https://openalex.org/W2361101593"],"abstract_inverted_index":{"Host":[0],"identification,":[1,126],"today,":[2],"can":[3,31,52,181],"be":[4,32,53,182,189],"done":[5,54],"at":[6,224],"many":[7,185],"layers":[8],"of":[9,69,83,97,119,124,138,146,218,221,230],"the":[10,16,40,73,93,106,116,162,165,198,203,219,228],"network":[11,199],"protocol":[12],"stack":[13],"depending":[14],"on":[15,49,142],"identifiable":[17],"parameter":[18],"used":[19],"for":[20,209,227],"classification.":[21],"But,":[22],"these":[23],"generally":[24],"include":[25,44],"fields":[26],"from":[27],"TCP/IP/MAC":[28],"packets;":[29],"that":[30,77,108,187],"spoofed":[33],"or":[34,43,213],"manipulated":[35],"very":[36,103],"easily":[37],"to":[38,80,92,105,127,171,184,191,238],"misguide":[39],"identification":[41,82,180],"process":[42],"intolerable":[45],"error":[46,130],"into.":[47],"Identification":[48],"wireless":[50,148],"networks":[51],"with":[55],"better":[56],"precision":[57],"by":[58],"using":[59],"physical":[60,241],"layer,":[61],"machine-dependent":[62],"characteristics.":[63],"We":[64,111,132],"provide":[65,112,134],"an":[66,120],"empirical":[67],"study":[68,137],"another":[70],"such":[71,173],"parameter,":[72],"host's":[74],"clock":[75,100,139],"information,":[76],"may":[78,188],"lead":[79],"accurate":[81],"a":[84,113,135,143],"host,":[85],"among":[86],"other":[87],"applications.":[88],"It":[89],"is":[90,102,161],"resistant":[91],"earlier":[94],"mentioned":[95],"methods":[96],"spoofing,":[98],"as":[99],"information":[101],"specific":[104,190],"oscillator":[107],"generates":[109],"it.":[110],"simplification":[114],"into":[115],"measurement":[117],"technique":[118],"already":[121],"investigated":[122],"approach":[123],"remote":[125],"achieve":[128],"lower":[129],"rates.":[131],"also":[133],"detailed":[136],"skew":[140,177],"behavior":[141],"LAN,":[144],"consisting":[145],"wired,":[147],"nodes":[149],"and":[150,153,167,243],"modern":[151],"mobile":[152,166],"hand-held":[154,168],"devices.":[155],"To":[156],"our":[157],"knowledge,":[158],"this":[159],"work":[160],"first":[163],"in":[164,201],"device":[169],"domain":[170],"identify":[172],"devices":[174],"definitively.":[175],"Clock":[176],"based":[178],"host":[179],"put":[183],"applications,":[186],"each":[192],"Enterprise":[193],"network.":[194],"For":[195],"instance,":[196],"aiding":[197],"administrator":[200],"monitoring":[202],"network,":[204],"malicious":[205],"activity":[206],"flagging":[207],"mechanism":[208],"IDS's/IPS's,":[210],"isolating":[211],"unknown":[212],"new":[214],"machines,":[215],"keeping":[216],"count":[217],"number":[220],"active":[222],"machines":[223,237,242],"any":[225],"time":[226],"purpose":[229],"say":[231],"IP":[232],"address":[233],"allocation,":[234],"associating":[235],"virtual":[236],"their":[239],"corresponding":[240],"so":[244],"on.":[245]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
