Precision time protocol attack strategies and their resistance to existing security extensions
Open Access
- 1 April 2021
- journal article
- research article
- Published by Springer Science and Business Media LLC in Cybersecurity
- Vol. 4 (1), 1-17
- https://doi.org/10.1186/s42400-021-00080-y
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- A Security Analysis and Revised Security Extension for the Precision Time ProtocolIEEE Transactions on Dependable and Secure Computing, 2017
- Advanced methodologies to deter internal attacks in PTP time synchronization networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- PTP monitoring in redundant networkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Improving PTP robustness to the byzantine failurePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Using a multi-source NTP watchdog to increase the robustness of PTPv2 in financial industry networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Multi-path Time ProtocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Security improvements for IEEE 1588 Annex K: Implementation and comparison of authentication codesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Time synchronization security using IPsec and MACsecPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Stuxnet: Dissecting a Cyberwarfare WeaponIEEE Security & Privacy, 2011
- Internet time synchronization: the network time protocolIEEE Transactions on Communications, 1991