2021
DOI: 10.1186/s42400-021-00080-y
|View full text |Cite
|
Sign up to set email alerts
|

Precision time protocol attack strategies and their resistance to existing security extensions

Abstract: The IEEE 1588 precision time protocol (PTP) is very important for many industrial sectors and applications that require time synchronization accuracy between computers down to microsecond and even nanosecond levels. Nevertheless, PTP and its underlying network infrastructure are vulnerable to cyber-attacks, which can stealthily reduce the time synchronization accuracy to unacceptable and even damage-causing levels for individual clocks or an entire network, leading to financial loss or even physical destructio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
43
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 27 publications
(43 citation statements)
references
References 19 publications
0
43
0
Order By: Relevance
“…RFC7384 [ 8 ] discusses the security threats to PTP and distinguishes between two types, namely the internal and the external attack, which can be conducted either by a man-in-the-middle (MitM) or an injector attacker. Furthermore, Alghamdi [ 7 ] further distinguished between the simple and the advanced internal attack by determining the attack range, the attack impact on time synchronization, and the attack implementation. These attack/attacker types have different characteristics as follows.…”
Section: The Precision Time Protocol and State-of-the-art Security Me...mentioning
confidence: 99%
See 4 more Smart Citations
“…RFC7384 [ 8 ] discusses the security threats to PTP and distinguishes between two types, namely the internal and the external attack, which can be conducted either by a man-in-the-middle (MitM) or an injector attacker. Furthermore, Alghamdi [ 7 ] further distinguished between the simple and the advanced internal attack by determining the attack range, the attack impact on time synchronization, and the attack implementation. These attack/attacker types have different characteristics as follows.…”
Section: The Precision Time Protocol and State-of-the-art Security Me...mentioning
confidence: 99%
“…Here, the attacker has only access to a trusted component of the network, but no access to cryptographic keys. The attacker can launch several PTP attacks, such as the packet removal attack, packet delay manipulation attack, replay attack, or the DoS attacks [ 7 ].…”
Section: The Precision Time Protocol and State-of-the-art Security Me...mentioning
confidence: 99%
See 3 more Smart Citations