A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node

被引:7
作者
Alghamdi, Waleed [1 ]
Schukat, Michael [1 ]
机构
[1] Natl Univ Ireland, Sch Comp Sci, Galway H91 TK33, Ireland
关键词
cyberattacks; IEEE; 1588; PTP; security; time synchronization protocols;
D O I
10.3390/s22103671
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Precision Time Protocol (PTP) as described in IEEE 1588-2019 provides a sophisticated mechanism to achieve microsecond or even sub-microsecond synchronization of computer clocks in a well-designed and managed network, therefore meeting the needs of even the most time-sensitive industrial and financial applications. However, PTP is prone to many security threats that impact on a correct clock synchronization, leading to potentially devastating consequences. Here, the most vicious attacks are internal attacks, where a threat actor has full access to the infrastructure including any cryptographic keys used. This paper builds on existing research on the impact of internal attack strategies on PTP networks. It shows limitations of existing security approaches to tackle internal attacks and proposes a new security approach using a trusted supervisor node (TSN), in line with prong D as specified in IEEE 1588-2019. A TSN collects and analyzes delay and offset outputs of monitored slaves, as well as timestamps embedded in PTP synchronization messages, allowing it to detect abnormal patterns that point to an attack. The paper distinguishes between two types of TSN with different capabilities and proposes two different detection algorithms. Experiments show the ability of the proposed method to detect all internal PTP attacks, while outlining its limitations.
引用
收藏
页数:23
相关论文
共 31 条
[1]   Precision time protocol attack strategies and their resistance to existing security extensions [J].
Alghamdi, Waleed ;
Schukat, Michael .
CYBERSECURITY, 2021, 4 (01)
[2]   Cyber Attacks on Precision Time Protocol Networks-A Case Study [J].
Alghamdi, Waleed ;
Schukat, Michael .
ELECTRONICS, 2020, 9 (09) :1-25
[3]  
Alghamdi W, 2017, 2017 28TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC)
[4]  
[Anonymous], 2015, 205922015 ST, P1
[5]  
[Anonymous], 2008, 15882008 IEEE, P1
[6]  
[Anonymous], G82752 TU
[7]   Developing Secure Products in the Age of Advanced Persistent Threats [J].
Baize, Eric .
IEEE SECURITY & PRIVACY, 2012, 10 (03) :88-92
[8]   Lowest common ancestors in trees and directed acyclic graphs [J].
Bender, MA ;
Farach-Colton, M ;
Pemmasani, G ;
Skiena, S ;
Sumazin, P .
JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 2005, 57 (02) :75-94
[9]  
Dadheech K, 2018, PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P595, DOI 10.1109/ICICCT.2018.8473328
[10]  
Dalmas M, 2015, I S PRECIS CLOCK SYN, P111, DOI 10.1109/ISPCS.2015.7324693