Security assessment of time synchronization mechanisms for the smart grid

B Moussa, M Debbabi, C Assi - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
The need to dynamically monitor the modern power grid, react to its disturbances, control,
and protect its operations requires the availability of globally synchronized measurement …

Requirements for secure clock synchronization

L Narula, TE Humphreys - IEEE Journal of Selected Topics in …, 2018 - ieeexplore.ieee.org
This paper establishes a fundamental theory of secure clock synchronization. Accurate clock
synchronization is the backbone of systems managing power distribution, financial …

Security mechanisms to protect IEEE 1588 synchronization: State of the art and trends

N Moreira, J Lázaro, J Jimenez, M Idirin… - … on Precision Clock …, 2015 - ieeexplore.ieee.org
The limitations of Annex K, as defined in the second version of IEEE 1588 standard, lead the
standardization committee to evolve from an integrated security solution to a set of internal …

A security analysis and revised security extension for the precision time protocol

E Itkin, A Wool - IEEE Transactions on Dependable and Secure …, 2017 - ieeexplore.ieee.org
The Precision Time Protocol (PTP) aims to provide highly accurate and synchronized clocks.
Its defining standard, IEEE 1588, has a security section (“Annex K”) which relies on …

Robust clock skew and offset estimation for IEEE 1588 in the presence of unexpected deterministic path delay asymmetries

AK Karthik, RS Blum - IEEE Transactions on Communications, 2020 - ieeexplore.ieee.org
IEEE 1588, built on the classical two-way message exchange scheme, is a popular clock
synchronization protocol for packet-switched networks. Due to the presence of random …

Cyber-attack on packet-based time synchronization protocols: The undetectable delay box

S Barreto, A Suresh… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
We present a cyber-attack on packet-based time synchronization protocols (PBTSP) with
high-accuracy requirements. The cyber-attack is undetectable from the PBTSP's perspective …

A security management architecture for time synchronization towards high precision networks

H Li, D Li, X Zhang, G Shou, Y Hu, Y Liu - Ieee Access, 2021 - ieeexplore.ieee.org
Time synchronization is quickly becoming a fundamental prerequisite for a smart society.
With the development of the fifth-generation (5G) network, time-sensitive networking (TSN) …

A new delay attack detection algorithm for PTP network in power substation

M Moradi, AH Jahangir - International Journal of Electrical Power & Energy …, 2021 - Elsevier
Time synchronization is one of the main issues for guaranteeing the correctness of actions
depending on the time of measured data or detected events by electronic devices across …

Exploiting power grid for accurate and secure clock synchronization in industrial IoT

S Viswanathan, R Tan, DKY Yau - 2016 IEEE Real-Time …, 2016 - ieeexplore.ieee.org
Desynchronized clocks among nodes in industrial Internet of Things (IoT) can degrade
system performance and even lead to safety incidents. Clock synchronization protocols …

The security of ntp's datagram protocol

A Malhotra, M Van Gundy, M Varia, H Kennedy… - … Cryptography and Data …, 2017 - Springer
Abstract For decades, the Network Time Protocol (NTP) has been used to synchronize
computer clocks over untrusted network paths. This work takes a new look at the security of …