Redundant Schemes or How to Counter the Delay Attack on Time Synchronization Protocols

The nature of communication networks is forcing scientists to consider security mechanisms, in order to protect their protocols from different manipulations and cyber-security attacks. The upcoming revision of IEEE 1588 will include concrete suggestions on how to harden the PTP time synchronization...

Full description

Saved in:
Bibliographic Details
Published in2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS) pp. 1 - 6
Main Authors Neyer, Johannes, Gassner, Lukas, Marinescu, Cristian
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The nature of communication networks is forcing scientists to consider security mechanisms, in order to protect their protocols from different manipulations and cyber-security attacks. The upcoming revision of IEEE 1588 will include concrete suggestions on how to harden the PTP time synchronization protocol against such attacks. One of the most important options is the use of redundant paths and/or participants. This paper discusses different issues that arise when using redundancy in combination with time synchronization. It further focuses on a certain attack specific to time synchronization protocols, the delay attack. A flexible attacker device was developed and used to prove the effectiveness of the implemented measures.
ISSN:1949-0313
DOI:10.1109/ISPCS.2019.8886635