DocumentCode
2497110
Title
Security flaws and workarounds for IEEE 1588 (transparent) clocks
Author
Treytl, Albert ; Hirschler, Bernd
Author_Institution
Inst. for Integrated Sensor Syst., Austrian Acad. of Sci., Wiener Neustadt, Austria
fYear
2009
fDate
12-16 Oct. 2009
Firstpage
1
Lastpage
6
Abstract
Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter measures that protect protocol addresses and prevent the misuse of security associations to replay IEEE 1588 messages.
Keywords
clocks; protocols; security of data; synchronisation; IEEE 1588 clock synchronization protocol; integrity check value calculation; security flaws; Clocks; Communication system security; Information security; Jitter; Master-slave; Peer to peer computing; Protection; Protocols; Synchronization; Wireless sensor networks; IEEE 1588; MAC modification; Security; clock synchronisation; security association flaws; transparent clocks;
fLanguage
English
Publisher
ieee
Conference_Titel
Precision Clock Synchronization for Measurement, Control and Communication, 2009. ISPCS 2009. International Symposium on
Conference_Location
Brescia
Print_ISBN
978-1-4244-4391-8
Electronic_ISBN
978-1-4244-4392-5
Type
conf
DOI
10.1109/ISPCS.2009.5340204
Filename
5340204
Link To Document