Cargando…

A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node

The Precision Time Protocol (PTP) as described in IEEE 1588–2019 provides a sophisticated mechanism to achieve microsecond or even sub-microsecond synchronization of computer clocks in a well-designed and managed network, therefore meeting the needs of even the most time-sensitive industrial and fin...

Descripción completa

Detalles Bibliográficos
Autores principales: Alghamdi, Waleed, Schukat, Michael
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9147087/
https://www.ncbi.nlm.nih.gov/pubmed/35632078
http://dx.doi.org/10.3390/s22103671
_version_ 1784716721979916288
author Alghamdi, Waleed
Schukat, Michael
author_facet Alghamdi, Waleed
Schukat, Michael
author_sort Alghamdi, Waleed
collection PubMed
description The Precision Time Protocol (PTP) as described in IEEE 1588–2019 provides a sophisticated mechanism to achieve microsecond or even sub-microsecond synchronization of computer clocks in a well-designed and managed network, therefore meeting the needs of even the most time-sensitive industrial and financial applications. However, PTP is prone to many security threats that impact on a correct clock synchronization, leading to potentially devastating consequences. Here, the most vicious attacks are internal attacks, where a threat actor has full access to the infrastructure including any cryptographic keys used. This paper builds on existing research on the impact of internal attack strategies on PTP networks. It shows limitations of existing security approaches to tackle internal attacks and proposes a new security approach using a trusted supervisor node (TSN), in line with prong D as specified in IEEE 1588–2019. A TSN collects and analyzes delay and offset outputs of monitored slaves, as well as timestamps embedded in PTP synchronization messages, allowing it to detect abnormal patterns that point to an attack. The paper distinguishes between two types of TSN with different capabilities and proposes two different detection algorithms. Experiments show the ability of the proposed method to detect all internal PTP attacks, while outlining its limitations.
format Online
Article
Text
id pubmed-9147087
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-91470872022-05-29 A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node Alghamdi, Waleed Schukat, Michael Sensors (Basel) Article The Precision Time Protocol (PTP) as described in IEEE 1588–2019 provides a sophisticated mechanism to achieve microsecond or even sub-microsecond synchronization of computer clocks in a well-designed and managed network, therefore meeting the needs of even the most time-sensitive industrial and financial applications. However, PTP is prone to many security threats that impact on a correct clock synchronization, leading to potentially devastating consequences. Here, the most vicious attacks are internal attacks, where a threat actor has full access to the infrastructure including any cryptographic keys used. This paper builds on existing research on the impact of internal attack strategies on PTP networks. It shows limitations of existing security approaches to tackle internal attacks and proposes a new security approach using a trusted supervisor node (TSN), in line with prong D as specified in IEEE 1588–2019. A TSN collects and analyzes delay and offset outputs of monitored slaves, as well as timestamps embedded in PTP synchronization messages, allowing it to detect abnormal patterns that point to an attack. The paper distinguishes between two types of TSN with different capabilities and proposes two different detection algorithms. Experiments show the ability of the proposed method to detect all internal PTP attacks, while outlining its limitations. MDPI 2022-05-11 /pmc/articles/PMC9147087/ /pubmed/35632078 http://dx.doi.org/10.3390/s22103671 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Alghamdi, Waleed
Schukat, Michael
A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node
title A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node
title_full A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node
title_fullStr A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node
title_full_unstemmed A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node
title_short A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node
title_sort security enhancement of the precision time protocol using a trusted supervisor node
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9147087/
https://www.ncbi.nlm.nih.gov/pubmed/35632078
http://dx.doi.org/10.3390/s22103671
work_keys_str_mv AT alghamdiwaleed asecurityenhancementoftheprecisiontimeprotocolusingatrustedsupervisornode
AT schukatmichael asecurityenhancementoftheprecisiontimeprotocolusingatrustedsupervisornode
AT alghamdiwaleed securityenhancementoftheprecisiontimeprotocolusingatrustedsupervisornode
AT schukatmichael securityenhancementoftheprecisiontimeprotocolusingatrustedsupervisornode