Network Time Security specification

The Network Time Security specification provides measures which are designed to add security to time synchronization protocols, while considering their specific timing-related requirements. The development of the specification is accompanied by formal analysis of its security model. Special attention is paid to the Network Time Protocol, for which an implementation of those measures is in progress.

[1]  Kristof Teichel,et al.  Using the Network Time Security Specification to Secure the Network Time Protocol , 2016 .

[2]  Stefan Milius,et al.  First Results of a Formal Analysis of the Network Time Security Specification , 2015, SSR.

[3]  Russ Housley,et al.  Cryptographic Message Syntax (CMS) , 2002, RFC.

[4]  Fu Fei,et al.  ASTS: An Agile Secure Time Synchronization Protocol for Wireless Sensor Networks , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[5]  Ran Canetti,et al.  Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction , 2005, RFC.

[6]  Michael Bailey,et al.  Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks , 2014, Internet Measurement Conference.

[7]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[8]  Tal Mizrahi,et al.  Security Requirements of Time Protocols in Packet Switched Networks , 2014, RFC.

[9]  Stephen Röttger,et al.  Analysis of the NTP Autokey Procedures , 2012 .

[10]  Stefan Milius,et al.  An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms , 2016, ICISS.

[11]  Kristof Teichel,et al.  Network Time Security , 2016 .

[12]  David L. Mills,et al.  Network Time Protocol Version 4: Autokey Specification , 2010, RFC.

[13]  T. Mizrahi A game theoretic analysis of delay attacks against time synchronization protocols , 2012, 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings.

[14]  Brian Weis,et al.  The Group Domain of Interpretation , 2003, RFC.

[15]  Russ Housley,et al.  Protecting Network Time Security Messages with the Cryptographic Message Syntax (CMS) , 2016 .

[16]  Peng Ning,et al.  TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.

[17]  David L. Mills,et al.  Internet Engineering Task Force (ietf) Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010 .

[18]  Scott O. Bradner,et al.  Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.

[19]  Kang Lee,et al.  IEEE 1588 standard for a precision clock synchronization protocol for networked measurement and control systems , 2002, 2nd ISA/IEEE Sensors for Industry Conference,.