scispace - formally typeset
Search or ask a question
Topic

Precision Time Protocol

About: Precision Time Protocol is a research topic. Over the lifetime, 604 publications have been published within this topic receiving 6006 citations. The topic is also known as: PTP & IEEE 1588.


Papers
More filters
Posted Content
TL;DR: A detailed threat analysis of the Precision Time Protocol standard is presented, in which the security properties that should be addressed by any security extension are highlighted and an efficient elliptic-curve Public-Key signatures are suggested.
Abstract: The Precision Time Protocol (PTP) aims to provide highly accurate and synchronised clocks. Its defining standard, IEEE 1588, has a security section ("Annex K") which relies on symmetric-key secrecy. In this paper we present a detailed threat analysis of the PTP standard, in which we highlight the security properties that should be addressed by any security extension. During this analysis we identify a sequence of new attacks and non-cryptographic network-based defenses that mitigate them. We then suggest to replace Annex K's symmetric cryptography by an efficient elliptic-curve Public-Key signatures. We implemented all our attacks to demonstrate their effectiveness, and also implemented and evaluated both the network and cryptographic defenses. Our results show that the proposed schemes are extremely practical, and much more secure than previous suggestions.

10 citations

Proceedings ArticleDOI
01 Jun 2017
TL;DR: How counter-measures based on public key infrastructures, trusted platform modules, network intrusion detection systems and time synchronization supervisors can be adopted to defeat or at least detect such internal attacks on time synchronization networks is discussed.
Abstract: High accurate time synchronization is very important for many applications and industrial environments. In a computer network, synchronization of time for connected devices is provided by the Precision Time Protocol (PTP), which in principal allows for device time synchronization down to microsecond level. However, PTP and network infrastructures are vulnerable to cyber-attacks, which can de-synchronize an entire network, leading to potentially devastating consequences. This paper will focus on the issue of internal attacks on time synchronization networks and discuss how counter-measures based on public key infrastructures, trusted platform modules, network intrusion detection systems and time synchronization supervisors can be adopted to defeat or at least detect such internal attacks.

10 citations

Book ChapterDOI
01 Jan 2009
TL;DR: An overview of military aircraft OLM programs, the typical parameters they measure and how they store and analyse the data, and some of the technology and other improvements that have allowed newer OLM systems to provide a better fatigue profile of the aircraft are described.
Abstract: With increasing costs and shrinking budgets, there is considerable economic pressure to get the most out of existing aircraft extending their in-service life if possible and to do so in a manner that does not compromise flight safety. One of the methods to achieve this is Operational Loads Monitoring (OLM). This paper presents an overview of military aircraft OLM programs, the typical parameters they measure and how they store and analyse the data. The research utilizes case studies of four aircraft for which ACRA CONTROL provided the data acquisition systems. The paper focuses on the data acquisition technology used to measure the flight parameters, the data processing and storage and how this data is processed on the ground. Finally, some of the technology and other improvements that have allowed newer OLM systems to provide a better fatigue profile of the aircraft are described.

10 citations

Proceedings ArticleDOI
19 Mar 2020
TL;DR: The IEEE 1588 Precision Time Protocol is a widely used mechanism to provide time synchronization of computer clocks down to microsecond accuracy as required by many financial and industrial applications, however, PTP is vulnerable to infrastructure cyber-attacks that reduce the desired accuracy.
Abstract: The IEEE 1588 Precision Time Protocol (PTP) is a widely used mechanism to provide time synchronization of computer clocks down to microsecond accuracy as required by many financial and industrial applications ("IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems," 2008). However, PTP is vulnerable to infrastructure cyber-attacks that reduce the desired accuracy. IEEE 1588 defined an experimental security extension (Annex K) in order to protect a PTP network, but various drawbacks have been discovered, resulting in further improvements including the use of public-key encryption ( Itkin & Wool, 2020 ) and reduce the three-way handshake mechanism to one way authentication ( Onal & Kirrmann, 2012 ). Today Annex K is deprecated in favor of L2 / L3 security mechanisms. Further on, in 2020 a backwards compatible IEEE 1588 version (v2.1) will be introduced, that contains a new security extension called Annex S. Annex S consists of four prongs as follows ("IEEE Draft Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems," 2019): • Prong (A) PTP Integrated Security Mechanism describes an authentication type-length-value (TLV) that is aligned with and integrated into the PTP message. • Prong (B) PTP External Transport Security Mechanisms describes the current external security mechanisms that can be used to provide protection to PTP message i.e., IPsec and MACsec. • Prong (C) Architecture Guidance describes a redundant time system, redundant grandmaster, and redundant paths. • Prong D (Monitoring and Management Guidance) suggests monitoring the slaves’ synchronization process.

10 citations

Journal ArticleDOI
TL;DR: In REVERSEPTP, a clock synchronization scheme for software-defined networks SDNs is introduced, which is based on the Precision Time Protocol PTP, but is conceptually reversed; all nodes switches in the network distribute timing information to a single software-based central node the SDN controller, which tracks the state of all the clocks in a network.
Abstract: We introduce REVERSEPTP, a clock synchronization scheme for software-defined networks SDNs. REVERSEPTPi¾?is based on the Precision Time Protocol PTP, but is conceptually reversed; in REVERSEPTP, all nodes switches in the network distribute timing information to a single software-based central node the SDN controller, which tracks the state of all the clocks in the network. Hence, all computations and bookkeeping are performed by the central node, whereas the 'dumb' switches are only required to periodically send it their current time. In accordance with the SDN paradigm, the 'brain' is implemented in software, making REVERSEPTP flexible and programmable from an SDN programmer's perspective. We present the REVERSEPTPi¾?architecture and discuss how it can be used in typical SDN architectures. Our experimental evaluation of a network with 34 REVERSEPTP-enabled nodes demonstrates the effectiveness and scalability of using REVERSEPTP. Copyright © 2016 John Wiley & Sons, Ltd.

10 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
77% related
Wireless ad hoc network
49K papers, 1.1M citations
75% related
Wireless sensor network
142K papers, 2.4M citations
75% related
Wireless network
122.5K papers, 2.1M citations
75% related
Wireless
133.4K papers, 1.9M citations
74% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202126
202045
201936
201839
201732
201654