Shereen et al., 2019 - Google Patents
Next steps in security for time synchronization: Experiences from implementing IEEE 1588 v2. 1Shereen et al., 2019
View HTML- Document ID
- 2721614620852167419
- Author
- Shereen E
- Bitard F
- Dán G
- Sel T
- Fries S
- Publication year
- Publication venue
- 2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS)
External Links
Snippet
The lack of integrated support for security has been a major shortcoming of Precision Time Protocol version 2 (PTPv2) for a long time. The upcoming PTPv2. 1 aims at addressing this shortcoming in a variety of ways, including the introduction of lightweight message …
- 229920001469 poly(aryloxy)thionylphosphazene 0 abstract description 71
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J3/00—Time-division multiplex systems
- H04J3/02—Details
- H04J3/06—Synchronising arrangements
- H04J3/0635—Clock or time synchronisation in a network
- H04J3/0638—Clock or time synchronisation among nodes; Internode synchronisation
- H04J3/0658—Clock or time synchronisation among packet nodes
- H04J3/0661—Clock or time synchronisation among packet nodes using timestamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shereen et al. | Next steps in security for time synchronization: Experiences from implementing IEEE 1588 v2. 1 | |
US11316869B2 (en) | Systems and methods for providing attestation of data integrity | |
EP4078919B1 (en) | Attestation service gateway | |
US11924223B2 (en) | Technologies for proving packet transit through uncompromised nodes | |
US8499161B2 (en) | Method and apparatus for secure trusted time techniques | |
Diaz-Sanchez et al. | TLS/PKI challenges and certificate pinning techniques for IoT and M2M secure communications | |
US20220086083A1 (en) | System and method of providing policy selection in a network | |
US11245484B2 (en) | Authenticating time sources using attestation-based methods | |
Lee et al. | maTLS: How to Make TLS middlebox-aware? | |
US11838283B2 (en) | Network enclave attestation for network and compute devices | |
EP3948612B1 (en) | Remote attestation of modular devices with multiple cryptoprocessors | |
Annessi et al. | Encryption is futile: Delay attacks on high-precision clock synchronization | |
Kumari et al. | A comprehensive and critical analysis of TLS 1.3 | |
Rezabek et al. | Ptp security measures and their impact on synchronization accuracy | |
Alghamdi et al. | Advanced methodologies to deter internal attacks in PTP time synchronization networks | |
Haberman et al. | Network time protocol version 4: Autokey specification | |
Langer et al. | Time synchronization performance using the network time security protocol | |
Alnahawi et al. | A Comprehensive Survey on Post-Quantum TLS | |
Shanmukesh et al. | Secure DLMS/COSEM communication for Next Generation Advanced Metering Infrastructure | |
US11558198B2 (en) | Real-time attestation of cryptoprocessors lacking timers and counters | |
Baiocco et al. | Causality re-ordering attacks on the IEC 60870-5-104 protocol | |
Mkacher | Optimization of Time Synchronization Techniques on Computer Networks | |
Parveen | Dtls with post quantum security for origin authentication and integrity | |
US20240171556A1 (en) | Network Time Protocol Key Encryption | |
Flores-Meath | Digital Signatures for PTP Using Transparent Clocks |