A security analysis and revised security extension for the precision time protocol

Eyal Itkin, Avishai Wool

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Precision Time Protocol (PTP) aims to provide highly accurate and synchronized clocks. Its defining standard, IEEE 1588, has a security section ('Annex K') which relies on symmetric-key secrecy. In this paper we present a detailed threat analysis of the PTP standard, in which we highlight the security properties that should be addressed by any security extension. During this analysis we identify a sequence of new attacks and non-cryptographic network-based defenses that mitigate them. We then suggest to replace Annex K's symmetric cryptography by an efficient elliptic-curve Public-Key signatures. We implemented all our attacks to demonstrate their effectiveness, and also implemented and evaluated both the network and cryptographic defenses. Our results show that the proposed schemes are extremely practical, and much more secure than previous suggestions.

Original languageEnglish
Title of host publicationISPCS 2016 - 2016 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, Proceedings
PublisherIEEE Computer Society
ISBN (Electronic)9781467396141
DOIs
StatePublished - 28 Sep 2016
Event10th IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, ISPCS 2016 - Stockholm, Sweden
Duration: 4 Sep 20169 Sep 2016

Publication series

NameIEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, ISPCS
Volume2016-September
ISSN (Print)1949-0305
ISSN (Electronic)1949-0313

Conference

Conference10th IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, ISPCS 2016
Country/TerritorySweden
CityStockholm
Period4/09/169/09/16

Fingerprint

Dive into the research topics of 'A security analysis and revised security extension for the precision time protocol'. Together they form a unique fingerprint.

Cite this