Cargando…
A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node
The Precision Time Protocol (PTP) as described in IEEE 1588–2019 provides a sophisticated mechanism to achieve microsecond or even sub-microsecond synchronization of computer clocks in a well-designed and managed network, therefore meeting the needs of even the most time-sensitive industrial and fin...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9147087/ https://www.ncbi.nlm.nih.gov/pubmed/35632078 http://dx.doi.org/10.3390/s22103671 |
_version_ | 1784716721979916288 |
---|---|
author | Alghamdi, Waleed Schukat, Michael |
author_facet | Alghamdi, Waleed Schukat, Michael |
author_sort | Alghamdi, Waleed |
collection | PubMed |
description | The Precision Time Protocol (PTP) as described in IEEE 1588–2019 provides a sophisticated mechanism to achieve microsecond or even sub-microsecond synchronization of computer clocks in a well-designed and managed network, therefore meeting the needs of even the most time-sensitive industrial and financial applications. However, PTP is prone to many security threats that impact on a correct clock synchronization, leading to potentially devastating consequences. Here, the most vicious attacks are internal attacks, where a threat actor has full access to the infrastructure including any cryptographic keys used. This paper builds on existing research on the impact of internal attack strategies on PTP networks. It shows limitations of existing security approaches to tackle internal attacks and proposes a new security approach using a trusted supervisor node (TSN), in line with prong D as specified in IEEE 1588–2019. A TSN collects and analyzes delay and offset outputs of monitored slaves, as well as timestamps embedded in PTP synchronization messages, allowing it to detect abnormal patterns that point to an attack. The paper distinguishes between two types of TSN with different capabilities and proposes two different detection algorithms. Experiments show the ability of the proposed method to detect all internal PTP attacks, while outlining its limitations. |
format | Online Article Text |
id | pubmed-9147087 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-91470872022-05-29 A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node Alghamdi, Waleed Schukat, Michael Sensors (Basel) Article The Precision Time Protocol (PTP) as described in IEEE 1588–2019 provides a sophisticated mechanism to achieve microsecond or even sub-microsecond synchronization of computer clocks in a well-designed and managed network, therefore meeting the needs of even the most time-sensitive industrial and financial applications. However, PTP is prone to many security threats that impact on a correct clock synchronization, leading to potentially devastating consequences. Here, the most vicious attacks are internal attacks, where a threat actor has full access to the infrastructure including any cryptographic keys used. This paper builds on existing research on the impact of internal attack strategies on PTP networks. It shows limitations of existing security approaches to tackle internal attacks and proposes a new security approach using a trusted supervisor node (TSN), in line with prong D as specified in IEEE 1588–2019. A TSN collects and analyzes delay and offset outputs of monitored slaves, as well as timestamps embedded in PTP synchronization messages, allowing it to detect abnormal patterns that point to an attack. The paper distinguishes between two types of TSN with different capabilities and proposes two different detection algorithms. Experiments show the ability of the proposed method to detect all internal PTP attacks, while outlining its limitations. MDPI 2022-05-11 /pmc/articles/PMC9147087/ /pubmed/35632078 http://dx.doi.org/10.3390/s22103671 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Alghamdi, Waleed Schukat, Michael A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node |
title | A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node |
title_full | A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node |
title_fullStr | A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node |
title_full_unstemmed | A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node |
title_short | A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node |
title_sort | security enhancement of the precision time protocol using a trusted supervisor node |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9147087/ https://www.ncbi.nlm.nih.gov/pubmed/35632078 http://dx.doi.org/10.3390/s22103671 |
work_keys_str_mv | AT alghamdiwaleed asecurityenhancementoftheprecisiontimeprotocolusingatrustedsupervisornode AT schukatmichael asecurityenhancementoftheprecisiontimeprotocolusingatrustedsupervisornode AT alghamdiwaleed securityenhancementoftheprecisiontimeprotocolusingatrustedsupervisornode AT schukatmichael securityenhancementoftheprecisiontimeprotocolusingatrustedsupervisornode |