Vulnerability of IEEE 1588 under Time Synchronization Attacks

Author(s):  
Mingyu Han ◽  
Peter Crossley
2013 ◽  
Vol 14 (10) ◽  
pp. 766-776 ◽  
Author(s):  
De-jun Li ◽  
Gang Wang ◽  
Can-jun Yang ◽  
Bo Jin ◽  
Yan-hu Chen

2012 ◽  
Vol 532-533 ◽  
pp. 292-296 ◽  
Author(s):  
Kang Wang ◽  
Yong Hui Hu ◽  
Zai Min He ◽  
Hong Jiao Ma

In view of PTP high precise timing requirement for many application fields, GPS time service is provided with the advantages of high precision and high stabilization. The principle and timescale of PTP based on GPS are analyzed and discussed. And then a PTP time synchronization platform with GPS-based UTC time is designed and implemented, the correlative key design flowchart is described as well. Finally, the paper gives the experiment results, which show the time synchronization accuracies can reach nanosecond range.


Author(s):  
G. Jablonski ◽  
D. Makowski ◽  
A. Mielczarek ◽  
M. Orlikowski ◽  
P. Perek ◽  
...  

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1398
Author(s):  
Waleed Alghamdi ◽  
Michael Schukat

The IEEE 1588 precision time protocol (PTP) is used by many time-sensitive applications and systems, as it achieves sub-microsecond time synchronization between computer clocks. However, a PTP network is vulnerable to cyber-attacks that can reduce the protocol accuracy to unacceptable levels for some or all clocks in a network with potentially devastating consequences. Of particular concern are advanced persistent threats (APT), where an actor infiltrates a network and operates stealthily and over extended periods of time before being discovered. This paper investigates the impact of the most important APT strategies on a PTP network, i.e., the delay attack, packet modification or transparent clock attack, and time reference attack, using a fully programable and customizable man in the middle device, thereby considering the two most popular PTP slave daemons PTPd and PTP4l. In doing so, it determines suitable attack patterns and parameters to compromise the time synchronization covertly.


Sign in / Sign up

Export Citation Format

Share Document