Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
158 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis (2401.10664v2)

Published 19 Jan 2024 in cs.CR and cs.NI

Abstract: High-precision time synchronization is a vital prerequisite for many modern applications and technologies, including Smart Grids, Time-Sensitive Networking (TSN), and 5G networks. Although the Precision Time Protocol (PTP) can accomplish this requirement in trusted environments, it becomes unreliable in the presence of specific cyber attacks. Mainly, time delay attacks pose the highest threat to the protocol, enabling attackers to diverge targeted clocks undetected. With the increasing danger of cyber attacks, especially against critical infrastructure, there is a great demand for effective countermeasures to secure both time synchronization and the applications that depend on it. However, current solutions are not sufficiently capable of mitigating sophisticated delay attacks. For example, they lack proper integration into the PTP protocol, scalability, or sound evaluation with the required microsecond-level accuracy. This work proposes an approach to detect and counteract delay attacks against PTP based on cyclic path asymmetry measurements over redundant paths. For that, we provide a method to find redundant paths in arbitrary networks and show how this redundancy can be exploited to reveal and mitigate undesirable asymmetries on the synchronization path that cause the malicious clock divergence. Furthermore, we propose PTPsec, a secure PTP protocol and its implementation based on the latest IEEE 1588-2019 standard. With PTPsec, we advance the conventional PTP to support reliable delay attack detection and mitigation. We validate our approach on a hardware testbed, which includes an attacker capable of performing static and incremental delay attacks at a microsecond precision. Our experimental results show that all attack scenarios can be reliably detected and mitigated with minimal detection time.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (24)
  1. A. Sargolzaei, K. Yen, and M. N. Abdelghani, “Delayed inputs attack on load frequency control in smart grid,” in ISGT 2014.   IEEE, 2014, pp. 1–5.
  2. “IEEE standard for a precision clock synchronization protocol for networked measurement and control systems,” IEEE Std 1588-2019 (Revision of IEEE Std 1588-2008), pp. 1–499, 2020.
  3. S. Barreto, A. Suresh, and J.-Y. Le Boudec, “Cyber-attack on packet-based time synchronization protocols: The undetectable delay box,” in 2016 IEEE International Instrumentation and Measurement Technology Conference Proceedings.   IEEE, 2016, Conference Proceedings.
  4. R. Annessi, J. Fabini, F. Iglesias, and T. Zseby, “Encryption is futile: Delay attacks on high-precision clock synchronization,” arXiv preprint arXiv:1811.08569, 2018.
  5. A. Finkenzeller, T. Wakim, M. Hamad, and S. Steinhorst, “Feasible time delay attacks against the precision time protocol,” in GLOBECOM 2022-2022 IEEE Global Communications Conference.   IEEE, 2022.
  6. Q. Yang, D. An, and W. Yu, “On time desynchronization attack against ieee 1588 protocol in power grid systems,” in 2013 IEEE Energytech.   IEEE, 2013, pp. 1–5.
  7. H. Li, D. Li, X. Zhang, G. Shou, Y. Hu, and Y. Liu, “A security management architecture for time synchronization towards high precision networks,” IEEE Access, vol. 9, pp. 117 542–117 553, 2021.
  8. J. Neyer, L. Gassner, and C. Marinescu, “Redundant schemes or how to counter the delay attack on time synchronization protocols,” in 2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS).   IEEE, 2019, Conference Proceedings.
  9. B. Moussa, M. Debbabi, and C. Assi, “A detection and mitigation model for ptp delay attack in a smart grid substation,” in 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).   IEEE, 2015, Conference Proceedings, pp. 497–502.
  10. W. Alghamdi and M. Schukat, “Advanced methodologies to deter internal attacks in ptp time synchronization networks,” in 2017 28th Irish Signals and Systems Conference (ISSC).   IEEE, 2017, Conference Proceedings.
  11. B. Moussa, M. Kassouf, R. Hadjidj, M. Debbabi, and C. Assi, “An extension to the precision time protocol (ptp) to enable the detection of cyber attacks,” IEEE Transactions on Industrial Informatics, 2020.
  12. M. Moradi and A. H. Jahangir, “A new delay attack detection algorithm for ptp network in power substation,” International Journal of Electrical Power & Energy Systems, vol. 133, 2021.
  13. T. Mizrahi, “A game theoretic analysis of delay attacks against time synchronization protocols,” in 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings.   IEEE, 2012, Conference Proceedings.
  14. W. Alghamdi and M. Schukat, “Precision time protocol attack strategies and their resistance to existing security extensions,” Cybersecurity, vol. 4, no. 1, 2021.
  15. J.-H. Choi and C. Yoo, “One-way delay estimation and its application,” Computer Communications, 2005.
  16. O. Gurewitz and M. Sidi, “Estimating one-way delays from cyclic-path delay measurements,” in Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No. 01CH37213), vol. 2.   IEEE, 2001, pp. 1038–1044.
  17. O. Gurewitz, I. Cidon, and M. Sidi, “One-way delay estimation using network-wide measurements,” IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2710–2724, 2006.
  18. T. Böhme, F. Göring, and J. Harant, “Menger’s theorem,” Journal of Graph Theory, vol. 37, no. 1, 2001.
  19. L. R. Ford and D. R. Fulkerson, “Maximal flow through a network,” Canadian journal of Mathematics, vol. 8, pp. 399–404, 1956.
  20. M. Ullmann and M. Vogeler, “Delay attacks — implication on ntp and ptp time synchronization,” in 2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.   IEEE, 2009, Conference Proceedings.
  21. W. Alghamdi and M. Schukat, “Cyber attacks on precision time protocol networks—a case study,” Electronics, vol. 9, no. 9, p. 1398, 2020.
  22. T. Mizrahi, “Slave diversity: Using multiple paths to improve the accuracy of clock synchronization protocols,” in 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings.   IEEE, 2012.
  23. A. Komes and C. Marinescu, “IEEE 1588 for redundant ethernet networks,” in 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings.   IEEE, 2012, Conference Proceedings.
  24. A. Shpiner, Y. Revah, and T. Mizrahi, “Multi-path time protocols,” in 2013 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication (ISPCS) Proceedings.   IEEE, 2013.

Summary

We haven't generated a summary for this paper yet.