Security aspects for IEEE 1588 based clock synchronization protocols

The synchronization of clocks in distributed systems is an enabling technology for many applications. Often clock synchronization is done in a master-slave fashion in order to gain high and predictable accuracy. Well-known representatives of this approach are IEEE 1588 and simplified forms of single-master NTP (Network Time Protocol). Although the simplicity of the master-slave (1:n) approach has advantages for implementation and operation compared to democratic approaches, it is also very vulnerable to failures or malicious attacks. One example is the poor ability to react on the fact that any malicious master, e. g., a Byzantine or “babbling idiot” node, has the potential to compromise all connected nodes with a wrong clock value. Available protocols solve the problem of correct synchronization of clocks in distributed systems, but poorly handle security. This paper will investigate common security properties of master-slave based clock synchronization algorithms, analyse the applicable threats and propose countermeasures to achieve more dependable systems.

[1]  T. Sauter,et al.  Security concept for a wide-area low-bandwidth power-line communication system , 2005, International Symposium on Power Line Communications and Its Applications, 2005..

[2]  G. Gaderer,et al.  Extending IEEE 1588 to fault tolerant clock synchronization , 2004, IEEE International Workshop on Factory Communication Systems, 2004. Proceedings..

[3]  Thilo Sauter,et al.  Embedded SynUTC and IEEE 1588 clock synchronization for industrial Ethernet , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).

[4]  G. Gaderer,et al.  Clock synchronization in powerline networks , 2005, International Symposium on Power Line Communications and Its Applications, 2005..