TY - GEN
T1 - Slave Clock Responses to Precision Time Protocol Attacks
T2 - 2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020
AU - Alghamdi, Waleed
AU - Schukat, Michael
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/6
Y1 - 2020/6
N2 - The IEEE 1588 Precision Time Protocol (PTP) is very important for many financial and industrial applications, as it can provide highly accurate time synchronisation down to microsecond level. However, any PTP infrastructure is vulnerable to cyber-attacks that can de-synchronise some or all network devices, causing potentially destructive consequences. This paper will focus on how two of these attacks, the asymmetric delay and the byzantine attack, can be implemented in a PTP network, analyses their impact on slave clocks, and investigates how these attacks can be detected.
AB - The IEEE 1588 Precision Time Protocol (PTP) is very important for many financial and industrial applications, as it can provide highly accurate time synchronisation down to microsecond level. However, any PTP infrastructure is vulnerable to cyber-attacks that can de-synchronise some or all network devices, causing potentially destructive consequences. This paper will focus on how two of these attacks, the asymmetric delay and the byzantine attack, can be implemented in a PTP network, analyses their impact on slave clocks, and investigates how these attacks can be detected.
KW - IEEE 1588
KW - PTP
KW - cyber-attacks
KW - security
KW - time synchronisation protocols
UR - https://www.scopus.com/pages/publications/85092009130
U2 - 10.1109/CyberSecurity49315.2020.9138888
DO - 10.1109/CyberSecurity49315.2020.9138888
M3 - Conference Publication
T3 - International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020
BT - International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 15 June 2020 through 19 June 2020
ER -