Abstract
This paper reports on a security analysis of the IEEE 1588 standard, a.k.a. Precise Time Protocol (PTP). We show that attackers can use the protocol to (a) incorrectly resynchronize clocks, (b) rearrange or disrupt the hierarchy of PTP clocks, (c) bring the protocol participants into an inconsistent state, or (d) deprive victim slave clocks from synchronization in ways undetectable by generic network intrusion detection systems. We also propose countermeasures for the identified attacks.
Chapter PDF
Similar content being viewed by others
References
A Precision Clock Synchronization Protocol for Networked Measurement and Control Systems, IEEE Standard 1588-2002 (November 2002)
Bishop, M.: A Security Analysis of the NTP Protocol Version 2. In: Proceedings of the Sixth Annual Computer Security Applications Conference, Tucson, AZ, USA, December 3-7, pp. 20–29 (1990)
Doyle, P.: Introduction to Real-Time Ethernet II. The Extension—A Technical Supplement to Control Network 5(4) (July-August 2004), available: www.ccontrols.com/pdf/Extv5n4.pdf
Eidson, J., Fischer, M.C., White, J.: IEEE-1588 Standard for a precision clock synchronization protocol for networked measurement and control systems. In: Proceedings of the 34th Annual Precise Time and Time Interval Systems and Applications Meeting, Reston, Virginia, December 3-5 (2002)
Mohl, D.: IEEE 1588-Precise Time Synchronization as the Basis for Real Time Application in Automation, available: www.industrialnetworking.com/support/general_faqs_info/Precise_Time_Sync.pdf
IEC, Precision clock synchronization protocol for networked measurement and control systems, IEC 61588, 1st edn., p. 158 (2004)
NTP: Network Time Protocol, available: www.ntp.org
Dunbar, N.: IPsec Networking Standards—An Overview. Information Security Technical Report 5(1), 35–48 (2001)
Harris, K.R., Balasubramanian, S., Moldovansky, A.: The Application of IEEE 1588 to a Distributed Motion Control System. In: ODVA CIP Networks Conference, November 16-18 (2004)
Gaderere, G., Sauter, T., Bumiller, G.: Clock Synchronization in Powerline Networks. In: Proceedings of International Symposium on Power Line Communications and Its Application, pp. 71–75 (2005)
Hansen, J.B., Young, S.: The Hacker’s Handbook, p. 512. CRC Press, Boca Raton (2004)
Tsang, J., Beznosov, K.: A Security Analysis of the Precise Time Protocol. LERSSE technical report, Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, LERSSE-TR-2006-02, p. 20 (October 2005), http://lersse-dl.ece.ubc.ca
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tsang, J., Beznosov, K. (2006). A Security Analysis of the Precise Time Protocol (Short Paper). In: Ning, P., Qing, S., Li, N. (eds) Information and Communications Security. ICICS 2006. Lecture Notes in Computer Science, vol 4307. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11935308_4
Download citation
DOI: https://doi.org/10.1007/11935308_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49496-6
Online ISBN: 978-3-540-49497-3
eBook Packages: Computer ScienceComputer Science (R0)