scholarly journals Precision time protocol attack strategies and their resistance to existing security extensions

Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Waleed Alghamdi ◽  
Michael Schukat

AbstractThe IEEE 1588 precision time protocol (PTP) is very important for many industrial sectors and applications that require time synchronization accuracy between computers down to microsecond and even nanosecond levels. Nevertheless, PTP and its underlying network infrastructure are vulnerable to cyber-attacks, which can stealthily reduce the time synchronization accuracy to unacceptable and even damage-causing levels for individual clocks or an entire network, leading to financial loss or even physical destruction. Existing security protocol extensions only partially address this problem. This paper provides a comprehensive analysis of strategies for advanced persistent threats to PTP infrastructure, possible attacker locations, and the impact on clock and network synchronization in the presence of security protocol extensions, infrastructure redundancy, and protocol redundancy. It distinguishes between attack strategies and attacker types as described in RFC7384, but further distinguishes between the spoofing and time source attack, the simple internal attack, and the advanced internal attack. Some experiments were conducted to demonstrate the impact of PTP attacks. Our analysis shows that a sophisticated attacker has a range of methodologies to compromise a PTP network. Moreover, all PTP infrastructure components can host an attacker, making the comprehensive protection of a PTP network against a malware infiltration, as for example exercised by Stuxnet, a very tedious task.

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1398
Author(s):  
Waleed Alghamdi ◽  
Michael Schukat

The IEEE 1588 precision time protocol (PTP) is used by many time-sensitive applications and systems, as it achieves sub-microsecond time synchronization between computer clocks. However, a PTP network is vulnerable to cyber-attacks that can reduce the protocol accuracy to unacceptable levels for some or all clocks in a network with potentially devastating consequences. Of particular concern are advanced persistent threats (APT), where an actor infiltrates a network and operates stealthily and over extended periods of time before being discovered. This paper investigates the impact of the most important APT strategies on a PTP network, i.e., the delay attack, packet modification or transparent clock attack, and time reference attack, using a fully programable and customizable man in the middle device, thereby considering the two most popular PTP slave daemons PTPd and PTP4l. In doing so, it determines suitable attack patterns and parameters to compromise the time synchronization covertly.


2020 ◽  
Vol 16 (1) ◽  
pp. 18-27 ◽  
Author(s):  
Bassam Moussa ◽  
Marthe Kassouf ◽  
Rachid Hadjidj ◽  
Mourad Debbabi ◽  
Chadi Assi

2012 ◽  
Vol 203 ◽  
pp. 192-197 ◽  
Author(s):  
Chuan Shun Yang ◽  
Xiang Ying Kong

In order to overcome the problem of the clock synchronization accuracy between scattered nodes was not high on traditional networked control systems, proposed a new method of using the IEEE 1588 standard for precision time protocol. First studied the principle and algorithm of precision time protocol, the best master clock algorithm and timestamp detection methods. Then presented the timestamp detection method with the use of software and hardware on networked control systems to improve clock synchronization accuracy, and analyzed the feasibility of the method in theory. Finally, tested accuracy of the clock synchronization, and the test results showed that synchronization accuracy can reach nanosecond, can meet the application requirements of the networked control systems.


2021 ◽  
Vol 11 (21) ◽  
pp. 9972
Author(s):  
Jian Chen ◽  
Mohamed A. Mohamed ◽  
Udaya Dampage ◽  
Mostafa Rezaei ◽  
Saleh H. Salmen ◽  
...  

To comply with electric power grid automation strategies, new cyber-security protocols and protection are required. What we now experience is a new type of protection against new disturbances namely cyber-attacks. In the same vein, the impact of disturbances arising from faults or cyber-attacks should be surveyed by network vulnerability criteria alone. It is clear that the diagnosis of vulnerable points protects the power grid against disturbances that would inhibit outages such as blackouts. So, the first step is determining the network vulnerable points, and then proposing a support method to deal with these outages. This research proposes a comprehensive approach to deal with outages by determining network vulnerable points due to physical faults and cyber-attacks. The first point, the network vulnerable points against network faults are covered by microgrids. As the second one, a new cyber-security protocol named multi-layer security is proposed in order to prevent targeted cyber-attacks. The first layer is a cyber-security-based blockchain method that plays a general role. The second layer is a cyber-security-based reinforcement-learning method, which supports the vulnerable points by monitoring data. On the other hand, the trend of solving problems becomes routine when no ambiguity arises in different sections of the smart grid, while it is far from a big network’s realities. Hence, the impact of uncertainty parameters on the proposed framework needs to be considered. Accordingly, the unscented transform method is modeled in this research. The simulation results illustrate that applying such a comprehensive approach can greatly pull down the probability of blackouts.


2020 ◽  
Vol 64 (5/6) ◽  
pp. 12:1-12:9
Author(s):  
S. R. Guendert ◽  
J. S. Houston ◽  
P. A. Wojciak ◽  
S Cherniak ◽  
D. L. Massey

2019 ◽  
Vol 15 (9) ◽  
pp. 155014771987937 ◽  
Author(s):  
Francisco Tirado-Andrés ◽  
Alvaro Araujo

Wireless sensor networks require time synchronization, which is the coordination of events or actions to make a system operate in unison. In this work, real experiments and a theoretical analysis of the behavior of the clock sources, most used in wireless sensor networks, have been carried out. The experiments have been performed on two real platforms from two different manufacturers in real environments with sudden changes in temperature. Complementary metal-oxide-semiconductor oscillators have a low accuracy, bigger than 500 ppm, and a high dependency with temperature. External crystal oscillators have good accuracy, around 20 ppm, and are stable with temperature. Temperature-compensated crystal oscillators are very accurate, around 5 ppm, and the temperature has no influence in their drift. The use of phase-locked loop circuits minimizes the impact of temperature and stabilizes oscillators. We highlight and demonstrate the importance of the early stages of design, especially the selection of the clock source, because that decision has a great impact on the performance of the time synchronization in wireless sensor networks.


2020 ◽  
Vol 11 (1) ◽  
pp. 285
Author(s):  
Runze Wu ◽  
Jinxin Gong ◽  
Weiyue Tong ◽  
Bing Fan

As the coupling relationship between information systems and physical power grids is getting closer, various types of cyber attacks have increased the operational risks of a power cyber-physical System (CPS). In order to effectively evaluate this risk, this paper proposed a method of cross-domain propagation analysis of a power CPS risk based on reinforcement learning. First, the Fuzzy Petri Net (FPN) was used to establish an attack model, and Q-Learning was improved through FPN. The attack gain was defined from the attacker’s point of view to obtain the best attack path. On this basis, a quantitative indicator of information-physical cross-domain spreading risk was put forward to analyze the impact of cyber attacks on the real-time operation of the power grid. Finally, the simulation based on Institute of Electrical and Electronics Engineers (IEEE) 14 power distribution system verifies the effectiveness of the proposed risk assessment method.


2021 ◽  
Vol 11 (3) ◽  
pp. 1312
Author(s):  
Ana Pamela Castro-Martin ◽  
Horacio Ahuett-Garza ◽  
Darío Guamán-Lozada ◽  
Maria F. Márquez-Alderete ◽  
Pedro D. Urbina Coronado ◽  
...  

Industry 4.0 (I4.0) is built upon the capabilities of Internet of Things technologies that facilitate the recollection and processing of data. Originally conceived to improve the performance of manufacturing facilities, the field of application for I4.0 has expanded to reach most industrial sectors. To make the best use of the capabilities of I4.0, machine architectures and design paradigms have had to evolve. This is particularly important as the development of certain advanced manufacturing technologies has been passed from large companies to their subsidiaries and suppliers from around the world. This work discusses how design methodologies, such as those based on functional analysis, can incorporate new functions to enhance the architecture of machines. In particular, the article discusses how connectivity facilitates the development of smart manufacturing capabilities through the incorporation of I4.0 principles and resources that in turn improve the computing capacity available to machine controls and edge devices. These concepts are applied to the development of an in-line metrology station for automotive components. The impact on the design of the machine, particularly on the conception of the control, is analyzed. The resulting machine architecture allows for measurement of critical features of all parts as they are processed at the manufacturing floor, a critical operation in smart factories. Finally, this article discusses how the I4.0 infrastructure can be used to collect and process data to obtain useful information about the process.


Sign in / Sign up

Export Citation Format

Share Document