安全时钟同步中的陷阱和缺陷

A. Treytl, G. Gaderer, B. Hirschler, R. Cohen
{"title":"安全时钟同步中的陷阱和缺陷","authors":"A. Treytl, G. Gaderer, B. Hirschler, R. Cohen","doi":"10.1109/ISPCS.2007.4383768","DOIUrl":null,"url":null,"abstract":"Clock synchronization has become one of the enabling techniques to enable real-time on both application-and network level. One of the most promising and currently intensively discussed approaches is IEEE1588, a master slave based synchronization protocol, which is intended to be a protocol not only limited for one application use, but for many domains such as telecom, test and measurement or factory automation. For some of these application domains security is a crucial feature, not only to prevent malicious attacks, but also to avoid accidental disturbances such as wrongly configured devices in the net. For the sake of these security requirements in version 2 of the IEEE1588 standard an informative annex describes an extension of the widely accepted protocol. Nevertheless not only the extension of a protocol with security fields defines a secure system, also a policy has to declare what to do in certain cases. This paper describes this security extension and gives and extensive analysis on the applicable threads as well as an attack of the master and approaches to include version 2 switches in a secure IEEE1588 clock synchronized network.","PeriodicalId":258197,"journal":{"name":"2007 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":"{\"title\":\"Traps and pitfalls in secure clock synchronization\",\"authors\":\"A. Treytl, G. Gaderer, B. Hirschler, R. Cohen\",\"doi\":\"10.1109/ISPCS.2007.4383768\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Clock synchronization has become one of the enabling techniques to enable real-time on both application-and network level. One of the most promising and currently intensively discussed approaches is IEEE1588, a master slave based synchronization protocol, which is intended to be a protocol not only limited for one application use, but for many domains such as telecom, test and measurement or factory automation. For some of these application domains security is a crucial feature, not only to prevent malicious attacks, but also to avoid accidental disturbances such as wrongly configured devices in the net. For the sake of these security requirements in version 2 of the IEEE1588 standard an informative annex describes an extension of the widely accepted protocol. Nevertheless not only the extension of a protocol with security fields defines a secure system, also a policy has to declare what to do in certain cases. This paper describes this security extension and gives and extensive analysis on the applicable threads as well as an attack of the master and approaches to include version 2 switches in a secure IEEE1588 clock synchronized network.\",\"PeriodicalId\":258197,\"journal\":{\"name\":\"2007 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-11-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"36\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPCS.2007.4383768\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPCS.2007.4383768","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 36

摘要

时钟同步已经成为在应用程序和网络级别实现实时的使能技术之一。其中最有前途和目前讨论最多的方法之一是IEEE1588,这是一个基于主从的同步协议,它的目的是成为一个协议,不仅限于一个应用程序的使用,但在许多领域,如电信,测试和测量或工厂自动化。对于其中一些应用程序域,安全性是一个至关重要的特性,不仅可以防止恶意攻击,还可以避免意外干扰,例如网络中错误配置的设备。为了满足IEEE1588标准第2版中的这些安全需求,一个翔实的附件描述了对这个被广泛接受的协议的扩展。然而,不仅使用安全字段的协议扩展定义了安全系统,策略也必须声明在某些情况下该做什么。本文描述了这种安全扩展,并对适用的线程、主站攻击和在安全的IEEE1588时钟同步网络中包含版本2交换机的方法进行了广泛的分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Traps and pitfalls in secure clock synchronization
Clock synchronization has become one of the enabling techniques to enable real-time on both application-and network level. One of the most promising and currently intensively discussed approaches is IEEE1588, a master slave based synchronization protocol, which is intended to be a protocol not only limited for one application use, but for many domains such as telecom, test and measurement or factory automation. For some of these application domains security is a crucial feature, not only to prevent malicious attacks, but also to avoid accidental disturbances such as wrongly configured devices in the net. For the sake of these security requirements in version 2 of the IEEE1588 standard an informative annex describes an extension of the widely accepted protocol. Nevertheless not only the extension of a protocol with security fields defines a secure system, also a policy has to declare what to do in certain cases. This paper describes this security extension and gives and extensive analysis on the applicable threads as well as an attack of the master and approaches to include version 2 switches in a secure IEEE1588 clock synchronized network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Object-oriented Model for IEEE 1588 Standard IEEE 1588 applied in the environment of high availability LANs Clock Synchronization for Wireless Positioning of COTS Mobile Nodes Precise Time Synchronization in Semiconductor Manufacturing Modeling and Simulation Analysis of PTP Clock Servo
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1