{"title":"Redundant Schemes or How to Counter the Delay Attack on Time Synchronization Protocols","authors":"Johannes Neyer, L. Gassner, C. Marinescu","doi":"10.1109/ISPCS.2019.8886635","DOIUrl":null,"url":null,"abstract":"The nature of communication networks is forcing scientists to consider security mechanisms, in order to protect their protocols from different manipulations and cyber-security attacks. The upcoming revision of IEEE 1588 will include concrete suggestions on how to harden the PTP time synchronization protocol against such attacks. One of the most important options is the use of redundant paths and/or participants. This paper discusses different issues that arise when using redundancy in combination with time synchronization. It further focuses on a certain attack specific to time synchronization protocols, the delay attack. A flexible attacker device was developed and used to prove the effectiveness of the implemented measures.","PeriodicalId":193584,"journal":{"name":"2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPCS.2019.8886635","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
The nature of communication networks is forcing scientists to consider security mechanisms, in order to protect their protocols from different manipulations and cyber-security attacks. The upcoming revision of IEEE 1588 will include concrete suggestions on how to harden the PTP time synchronization protocol against such attacks. One of the most important options is the use of redundant paths and/or participants. This paper discusses different issues that arise when using redundancy in combination with time synchronization. It further focuses on a certain attack specific to time synchronization protocols, the delay attack. A flexible attacker device was developed and used to prove the effectiveness of the implemented measures.