A Security Management Architecture for Time Synchronization towards High Precision Networks
Time synchronization is quickly becoming a fundamental prerequisite for a smart society. With the development of the fifth-generation (5G) network, time-sensitive networking (TSN), and the rise of high-precision networks, its accurate and reliable features have attracted an increasing amount of atte...
Saved in:
Published in | IEEE access Vol. 9; p. 1 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.01.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Time synchronization is quickly becoming a fundamental prerequisite for a smart society. With the development of the fifth-generation (5G) network, time-sensitive networking (TSN), and the rise of high-precision networks, its accurate and reliable features have attracted an increasing amount of attention. As the most promising protocol with sub-microsecond accuracy, precision time protocol (PTP) has been widely used for network synchronization, and its proper operation and security are critical to the industries that build the infrastructure for the smart society. In order to provide synchronization security as a service, this paper presents a scheme based on software-defined networking (SDN) and network functions virtualization (NFV) principles for synchronization security. Security management is built as a virtual network function (VNF), and a mitigation mechanism is proposed to detect delay attacks and generate countermeasures. Finally, we investigate the impact of random delay attacks, constant delay attacks, and linear delay attacks on the offset and path delay in the PTP synchronization process through experiments. The results show that the scheme is capable of detecting PTP delay attacks and mitigating their impact on time synchronization. |
---|---|
AbstractList | Time synchronization is quickly becoming a fundamental prerequisite for a smart society. With the development of the fifth-generation (5G) network, time-sensitive networking (TSN), and the rise of high-precision networks, its accurate and reliable features have attracted an increasing amount of attention. As the most promising protocol with sub-microsecond accuracy, precision time protocol (PTP) has been widely used for network synchronization, and its proper operation and security are critical to the industries that build the infrastructure for a smart society. In order to provide synchronization security as a service, this paper presents a scheme based on software-defined networking (SDN) and network functions virtualization (NFV) principles for synchronization security. Security management is built as a virtual network function (VNF), and a mitigation mechanism is proposed to detect delay attacks and generate countermeasures. Finally, we investigate the impact of random delay attacks, constant delay attacks, and linear delay attacks and verify the performance of the proposed mitigation mechanism through experiments. The results show that the scheme is capable of detecting PTP delay attacks and mitigating their impact on time synchronization. Time synchronization is quickly becoming a fundamental prerequisite for a smart society. With the development of the fifth-generation (5G) network, time-sensitive networking (TSN), and the rise of high-precision networks, its accurate and reliable features have attracted an increasing amount of attention. As the most promising protocol with sub-microsecond accuracy, precision time protocol (PTP) has been widely used for network synchronization, and its proper operation and security are critical to the industries that build the infrastructure for the smart society. In order to provide synchronization security as a service, this paper presents a scheme based on software-defined networking (SDN) and network functions virtualization (NFV) principles for synchronization security. Security management is built as a virtual network function (VNF), and a mitigation mechanism is proposed to detect delay attacks and generate countermeasures. Finally, we investigate the impact of random delay attacks, constant delay attacks, and linear delay attacks on the offset and path delay in the PTP synchronization process through experiments. The results show that the scheme is capable of detecting PTP delay attacks and mitigating their impact on time synchronization. |
Author | Hu, Yihong Li, Dengkui Shou, Guochu Liu, Yaqiong Li, Hongxing Zhang, Xiaodong |
Author_xml | – sequence: 1 givenname: Hongxing surname: Li fullname: Li, Hongxing organization: Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China – sequence: 2 givenname: Dengkui surname: Li fullname: Li, Dengkui organization: Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China – sequence: 3 givenname: Xiaodong surname: Zhang fullname: Zhang, Xiaodong organization: Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China – sequence: 4 givenname: Guochu surname: Shou fullname: Shou, Guochu organization: Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China – sequence: 5 givenname: Yihong surname: Hu fullname: Hu, Yihong organization: Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China – sequence: 6 givenname: Yaqiong surname: Liu fullname: Liu, Yaqiong organization: Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China |
BookMark | eNpNkU1rGzEQhkVJoWmaX5CLoGe7-ljtSkdj0iaQfoDTUw9iPJq15carVJIJzq_vuhtC5zLDy7zvDDzv2dmQBmLsSoq5lMJ9WiyX16vVXAkl51qKTgn9hp0r2bqZNro9-29-xy5L2Ymx7CiZ7pz9WvAV4SHHeuRfYYAN7WmofJFxGythPWTifcr8Pu6Jr44DbnMa4jPUmAZe0xPkUPhN3Gz5j0wYy0n-RvUp5d_lA3vbw0Ohy5d-wX5-vr5f3szuvn-5XS7uZtgIW2fkTG_XoQmEzmLoAsimRZKisaFBAoUCRK8C9MFo0Mp2OgBqiQFbo02rL9jtlBsS7PxjjnvIR58g-n9CyhsPuUZ8IK_lOvTgegtWN9Yq17VKrYXpEKV2jRuzPk5Zjzn9OVCpfpcOeRjf98q0RumuMactPW1hTqVk6l-vSuFPUPwExZ-g-Bcoo-tqckUienU4o6QSrf4L1S-K1Q |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_1016_j_comnet_2023_109936 crossref_primary_10_1109_MCOM_014_2300031 crossref_primary_10_1109_ACCESS_2023_3300650 crossref_primary_10_21205_deufmd_2024267613 crossref_primary_10_1016_j_dcan_2023_10_005 crossref_primary_10_1016_j_sysarc_2023_102852 crossref_primary_10_1007_s11128_023_04158_z |
Cites_doi | 10.1109/IINTEC.2017.8325927 10.1109/TSG.2016.2644618 10.1145/1380564.1380571 10.1109/WFCS.2006.1704163 10.1109/ICIT.2017.7915522 10.1109/IEEESTD.2008.4579760 10.1109/COMST.2016.2525014 10.17487/rfc2104 10.1109/JSYST.2020.3030664 10.1109/ISPCS.2012.6336612 10.1109/CRIS.2009.5071498 10.1155/2016/6297476 10.1007/978-3-319-11599-3_14 10.1109/ICIT.2016.7474866 10.1109/ISPCS.2009.5340224 10.1109/ISPCS.2011.6070153 10.1109/NETSOFT.2016.7502485 10.1109/ISPCS.2007.4383768 10.1109/ISPCS.2015.7324689 10.1109/ISPCS.2010.5609765 10.1109/ISPCS.2012.6336632 10.1109/ISPCS.2016.7579509 10.1364/OFC.2014.W2A.6 10.1109/MCOMSTD.2017.1600768ST 10.1109/CSAC.1990.143746 10.1109/MCOM.2017.1601016CM 10.1007/11935308_4 10.1109/ISPCS.2009.5340204 10.1145/2518037.2491245 10.1109/JSTSP.2018.2835772 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2021.3107203 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998-Present IEL CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Open Access: DOAJ - Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: Open Access: DOAJ - Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEL url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 1 |
ExternalDocumentID | oai_doaj_org_article_31bdfa9f8a83488297622b057cc13949 10_1109_ACCESS_2021_3107203 9521206 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 92067102 funderid: 10.13039/501100001809 |
GroupedDBID | 0R~ 5VS 6IK 97E AAJGR ABVLG ACGFS ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS ESBDL GROUPED_DOAJ IFIPE IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RIG RNS 4.4 AAYXX CITATION EJD 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-e95f8bd4dec98cd7da146ce1048d4cea2c0a0f2dafd53a32873dac31cdc653563 |
IEDL.DBID | RIE |
ISSN | 2169-3536 |
IngestDate | Thu Jul 04 21:10:22 EDT 2024 Fri Sep 13 03:22:38 EDT 2024 Fri Aug 23 02:46:42 EDT 2024 Wed Jun 26 19:28:46 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-e95f8bd4dec98cd7da146ce1048d4cea2c0a0f2dafd53a32873dac31cdc653563 |
ORCID | 0000-0002-3286-1409 0000-0002-3376-9719 0000-0002-8271-0246 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9521206 |
PQID | 2565237459 |
PQPubID | 4845423 |
PageCount | 1 |
ParticipantIDs | crossref_primary_10_1109_ACCESS_2021_3107203 proquest_journals_2565237459 ieee_primary_9521206 doaj_primary_oai_doaj_org_article_31bdfa9f8a83488297622b057cc13949 |
PublicationCentury | 2000 |
PublicationDate | 2021-01-01 |
PublicationDateYYYYMMDD | 2021-01-01 |
PublicationDate_xml | – month: 01 year: 2021 text: 2021-01-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref37 ref15 ref36 ref14 ref31 ref30 ref33 ref11 ref32 ref10 (ref12) 0 (ref7) 2016 (ref2) 2020 ref39 ref17 ref16 ref19 ref18 (ref20) 2012 (ref21) 2012 (ref4) 2017 (ref42) 2008 ref24 ref23 ref26 ref41 ref22 (ref25) 2012 annessi (ref38) 2017 ref28 ref27 ref29 (ref1) 2021 ref9 ref3 (ref6) 2020 ref5 ref40 (ref8) 2019 |
References_xml | – year: 2019 ident: ref8 publication-title: New Services and Capabilities for Network 2030-Description Technical Gap and Performance Target Analysis – year: 2020 ident: ref2 publication-title: Representative Use Cases and Key Network Requirements for Network 2030 – year: 2017 ident: ref38 article-title: SecureTime: Secure multicast time synchronization publication-title: arXiv 1705 10669 contributor: fullname: annessi – ident: ref37 doi: 10.1109/IINTEC.2017.8325927 – ident: ref40 doi: 10.1109/TSG.2016.2644618 – year: 2017 ident: ref4 publication-title: MiFID II - RTS 25 Clock Synchronization – ident: ref41 doi: 10.1145/1380564.1380571 – year: 2016 ident: ref7 publication-title: WG802 1 - Higher Layer LAN Protocols Working Group – year: 0 ident: ref12 – ident: ref27 doi: 10.1109/WFCS.2006.1704163 – ident: ref36 doi: 10.1109/ICIT.2017.7915522 – year: 2012 ident: ref21 publication-title: White Paper on Network Functions Virtualisation – year: 2012 ident: ref25 publication-title: Time and Phase Synchronization Aspects in Packet Networks – ident: ref11 doi: 10.1109/IEEESTD.2008.4579760 – ident: ref10 doi: 10.1109/COMST.2016.2525014 – ident: ref15 doi: 10.17487/rfc2104 – ident: ref24 doi: 10.1109/JSYST.2020.3030664 – year: 2012 ident: ref20 publication-title: Software-Defined Networking The New Norm for Networks – ident: ref35 doi: 10.1109/ISPCS.2012.6336612 – year: 2008 ident: ref42 publication-title: The Linuxptp Project Linuxptp V2 0 – ident: ref30 doi: 10.1109/CRIS.2009.5071498 – ident: ref9 doi: 10.1155/2016/6297476 – ident: ref18 doi: 10.1007/978-3-319-11599-3_14 – ident: ref17 doi: 10.1109/ICIT.2016.7474866 – ident: ref34 doi: 10.1109/ISPCS.2009.5340224 – ident: ref32 doi: 10.1109/ISPCS.2011.6070153 – ident: ref19 doi: 10.1109/NETSOFT.2016.7502485 – ident: ref28 doi: 10.1109/ISPCS.2007.4383768 – ident: ref26 doi: 10.1109/ISPCS.2015.7324689 – ident: ref33 doi: 10.1109/ISPCS.2010.5609765 – ident: ref29 doi: 10.1109/ISPCS.2012.6336632 – ident: ref16 doi: 10.1109/ISPCS.2016.7579509 – ident: ref23 doi: 10.1364/OFC.2014.W2A.6 – year: 2020 ident: ref6 publication-title: Base Station (BS) Radio Transmission and Reception – ident: ref5 doi: 10.1109/MCOMSTD.2017.1600768ST – ident: ref14 doi: 10.1109/CSAC.1990.143746 – ident: ref22 doi: 10.1109/MCOM.2017.1601016CM – ident: ref13 doi: 10.1007/11935308_4 – ident: ref31 doi: 10.1109/ISPCS.2009.5340204 – ident: ref3 doi: 10.1145/2518037.2491245 – ident: ref39 doi: 10.1109/JSTSP.2018.2835772 – year: 2021 ident: ref1 publication-title: Evolution Towards 5G-Advanced |
SSID | ssj0000816957 |
Score | 2.2725527 |
Snippet | Time synchronization is quickly becoming a fundamental prerequisite for a smart society. With the development of the fifth-generation (5G) network,... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Publisher |
StartPage | 1 |
SubjectTerms | Clocks Computer architecture Cybersecurity Delay delay attacks Delays high precision communication network functions virtualization precision time protocol Protocols Security Security management Software-defined networking Synchronization Time synchronization time-sensitive networking Virtual networks |
SummonAdditionalLinks | – databaseName: Open Access: DOAJ - Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxgQUBCBgjwwEjWOnYfHUFFVSFRIbaVKDJbjx1hQWwb-PedHSxADC2sUxfGdc_6--O47hO4qpnLKWkBuRrKUcUvT1hXqWksJaWvFc9957nlaThbsaVksO62-XE5YkAcOhhtS0morua1lTWGx5bB95nkLKEMpAC8slO6RokOmfAyuScmLKsoMkYwPm9EIZgSEMCfAUzN3-vhjK_KK_bHFyq-47Deb8Qk6jigRN-HtTtGBWZ2ho452YB-9NngWe8_h7xwW3HQOBjAAUuxqPPDsc6W8Cm4ousRznyy7wS7LA7-sY58dPA054ZtztBg_zkeTNHZKSBXL6m1qeGHrVjNtFK-VrrSEAKgMUK1aM2VkrjKZ2VxLqwsqKbAkqqWiRGlVFrQo6QXqrd5W5hJhzgBgyBJ81TJmAHwZmUmqDAMep4myCbrfGU28B0EM4YlExkWwsXA2FtHGCXpwht3f6tSs_QXwsYg-Fn_5OEF955b9Q7grOM7KBA12bhLxy9sIgHDArStW8Kv_GPoaHbrphJ8uA9Tbrj_MDcCQbXvrV9wXr27XqA priority: 102 providerName: Directory of Open Access Journals |
Title | A Security Management Architecture for Time Synchronization towards High Precision Networks |
URI | https://ieeexplore.ieee.org/document/9521206 https://www.proquest.com/docview/2565237459/abstract/ https://doaj.org/article/31bdfa9f8a83488297622b057cc13949 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED0BEwx8I8qXPDCSkthOG4-lAiEkEBIgITFE9tlekApq0wF-PWfHLZ8DWxQ5kZOX2O_Zd-8AjvsSuZCGmJvTMpPKi8yERF3vRVGYChWPleeub3qXD_LqsXxcgJN5LoxzLgafuW44jHv59gWnYansVIVE0-CvvVjlvM3Vmq-nhAISquwnY6EiV6eD4ZCegSQgL0iZ5mG_8dvkEz36U1GVXyNxnF4u1uB61rE2quS5O21MF99_eDb-t-frsJp4Jhu0H8YGLLjRJqx8cR_cgqcBu0vV69hnFAwbfNlaYERpWcgSYXdvI4w-um3aJmtiuO2EhTgRdjtOlXrYTRtVPtmGh4vz--FllmotZCjzqsmcKn1lrLQOVYW2bzUNoehIrFVWotMcc517brW3pdCCdJawGkWBFnulKHtiB5ZGLyO3C0xJoii6R2gbKR3RN6dzLdBJUoK2QN-BkxkI9WtrqVFHKZKrusWsDpjVCbMOnAWg5k2DH3Y8QS-4Tr8XtTXWa-UrXQkakjiRLM4NcVFEorhSdWArgDK_ScKjAwcz2Ov0705qIoGkzvuyVHt_X7UPy6GD7ULMASw146k7JGrSmKMo6Y_il_kBMUnjBQ |
link.rule.ids | 315,786,790,802,870,2115,27957,27958,55109 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT9swFH5C7LBxYIwfooxtPuxIShI7bXws1VC30QoJkJA4WPazfUFqEU0P8Nfz7LgdDA7cosSJ7Hz-8T37ve8B_OwLLLkwxNycFpmQnmcmBOp6z4vC1CjLmHluPOmNrsSf6-p6DY5WsTDOueh85rrhMp7l2xkuwlbZsQyBpkFf-wOt87lso7VWOyohhYSs-klaiJ4fD4ZDagUZgWVBtmkeThxfLD9RpT-lVXk1F8cF5vQzjJdVa_1KbruLxnTx8T_VxvfWfQs2E9Nkg7ZrfIE1N92GjWf6gztwM2AXKX8d--cHwwbPDhcYkVoW4kTYxcMUo5JuG7jJmuhwO2fBU4Sd36dcPWzS-pXPd-Hq9NflcJSlbAsZirxuMicrXxsrrENZo-1bTZMoOjLXaivQ6RJznfvSam8rrjlZWtxq5AVa7FW86vE9WJ_Opm4fmBREUnSP8DZCOCJwTueaoxNkC9oCfQeOliCou1ZUQ0VjJJeqxUwFzFTCrAMnAahV0aCIHW_QD1ZpgFFZY72WvtY1p0mpJJpVlobYKCKRXCE7sBNAWX0k4dGBwyXsKo3euSIaSPZ5X1Ty4O23fsDH0eX4TJ39nvz9Cp9CZdttmUNYb-4X7hsRlcZ8j_3zCfQV5WY |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Security+Management+Architecture+for+Time+Synchronization+Towards+High+Precision+Networks&rft.jtitle=IEEE+access&rft.au=Li%2C+Hongxing&rft.au=Li%2C+Dengkui&rft.au=Zhang%2C+Xiaodong&rft.au=Shou%2C+Guochu&rft.date=2021-01-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2169-3536&rft.volume=9&rft.spage=117542&rft_id=info:doi/10.1109%2FACCESS.2021.3107203&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |