[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shereen et al., 2019 - Google Patents

Next steps in security for time synchronization: Experiences from implementing IEEE 1588 v2. 1

Shereen et al., 2019

View HTML
Document ID
2721614620852167419
Author
Shereen E
Bitard F
Dán G
Sel T
Fries S
Publication year
Publication venue
2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS)

External Links

Snippet

The lack of integrated support for security has been a major shortcoming of Precision Time Protocol version 2 (PTPv2) for a long time. The upcoming PTPv2. 1 aims at addressing this shortcoming in a variety of ways, including the introduction of lightweight message …
Continue reading at www.diva-portal.org (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/06Synchronising arrangements
    • H04J3/0635Clock or time synchronisation in a network
    • H04J3/0638Clock or time synchronisation among nodes; Internode synchronisation
    • H04J3/0658Clock or time synchronisation among packet nodes
    • H04J3/0661Clock or time synchronisation among packet nodes using timestamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Similar Documents

Publication Publication Date Title
Shereen et al. Next steps in security for time synchronization: Experiences from implementing IEEE 1588 v2. 1
US11316869B2 (en) Systems and methods for providing attestation of data integrity
EP4078919B1 (en) Attestation service gateway
US11924223B2 (en) Technologies for proving packet transit through uncompromised nodes
US8499161B2 (en) Method and apparatus for secure trusted time techniques
Diaz-Sanchez et al. TLS/PKI challenges and certificate pinning techniques for IoT and M2M secure communications
US20220086083A1 (en) System and method of providing policy selection in a network
US11245484B2 (en) Authenticating time sources using attestation-based methods
Lee et al. maTLS: How to Make TLS middlebox-aware?
US11838283B2 (en) Network enclave attestation for network and compute devices
EP3948612B1 (en) Remote attestation of modular devices with multiple cryptoprocessors
Annessi et al. Encryption is futile: Delay attacks on high-precision clock synchronization
Kumari et al. A comprehensive and critical analysis of TLS 1.3
Rezabek et al. Ptp security measures and their impact on synchronization accuracy
Alghamdi et al. Advanced methodologies to deter internal attacks in PTP time synchronization networks
Haberman et al. Network time protocol version 4: Autokey specification
Langer et al. Time synchronization performance using the network time security protocol
Alnahawi et al. A Comprehensive Survey on Post-Quantum TLS
Shanmukesh et al. Secure DLMS/COSEM communication for Next Generation Advanced Metering Infrastructure
US11558198B2 (en) Real-time attestation of cryptoprocessors lacking timers and counters
Baiocco et al. Causality re-ordering attacks on the IEC 60870-5-104 protocol
Mkacher Optimization of Time Synchronization Techniques on Computer Networks
Parveen Dtls with post quantum security for origin authentication and integrity
US20240171556A1 (en) Network Time Protocol Key Encryption
Flores-Meath Digital Signatures for PTP Using Transparent Clocks