Advanced Methodologies to Deter Internal Attacks in PTP Time Synchronization Networks
Title | Advanced Methodologies to Deter Internal Attacks in PTP Time Synchronization Networks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Alghamdi, W., Schukat, M. |
Conference Name | 2017 28th Irish Signals and Systems Conference (ISSC) |
Date Published | jun |
Keywords | accurate time synchronization, Clocks, composability, computer network, computer network security, cryptography, Cyber Attacks, cyber-attacks, delays, device time synchronization, industrial environments, internal attacks, IP networks, microsecond level, network infrastructures, network intrusion detection systems, precision time protocol, Protocols, PTP time synchronization networks, pubcrawl, public key cryptography, public key infrastructures, Resiliency, security, synchronisation, Synchronization, time synchronization, time synchronization supervisors, trusted platform modules |
Abstract | High accurate time synchronization is very important for many applications and industrial environments. In a computer network, synchronization of time for connected devices is provided by the Precision Time Protocol (PTP), which in principal allows for device time synchronization down to microsecond level. However, PTP and network infrastructures are vulnerable to cyber-attacks, which can de-synchronize an entire network, leading to potentially devastating consequences. This paper will focus on the issue of internal attacks on time synchronization networks and discuss how counter-measures based on public key infrastructures, trusted platform modules, network intrusion detection systems and time synchronization supervisors can be adopted to defeat or at least detect such internal attacks. |
URL | http://ieeexplore.ieee.org/document/7983636/ |
DOI | 10.1109/ISSC.2017.7983636 |
Citation Key | alghamdi_advanced_2017 |
- network infrastructures
- trusted platform modules
- time synchronization supervisors
- time synchronization
- Synchronization
- synchronisation
- security
- Resiliency
- public key infrastructures
- public key cryptography
- pubcrawl
- PTP time synchronization networks
- Protocols
- precision time protocol
- network intrusion detection systems
- accurate time synchronization
- microsecond level
- IP networks
- internal attacks
- industrial environments
- device time synchronization
- delays
- cyber-attacks
- Cyber Attacks
- Cryptography
- computer network security
- computer network
- composability
- Clocks