Network time theory

Author(s):  
Philip Pond
Keyword(s):  
Proceedings ◽  
2021 ◽  
Vol 74 (1) ◽  
pp. 1
Author(s):  
Hilal Çepik ◽  
Ömer Aydın ◽  
Gökhan Dalkılıç

With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.


2021 ◽  
Vol 104 ◽  
pp. 102214
Author(s):  
Ting He ◽  
Yong Zheng ◽  
Zherui Ma

1991 ◽  
Vol 44 (13) ◽  
pp. 6673-6688 ◽  
Author(s):  
K. R. Elder ◽  
B. Morin ◽  
Martin Grant ◽  
R. C. Desai

1983 ◽  
Vol 13 (10) ◽  
pp. 1013-1022 ◽  
Author(s):  
T. Chang
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document