Security Requirements of Time Protocols in Packet Switched Networks

As time and frequency distribution protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of security requirements for time protocols, focusing on the Precision Time Protocol (PTP) and the Network Time Protocol (NTP). This document also discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols, and the dependencies between other security services and time synchronization.

[1]  Scott O. Bradner,et al.  Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.

[2]  Albert Treytl,et al.  Securing IEEE 1588 by IPsec tunnels - An analysis , 2010, 2010 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.

[3]  T. Mizrahi A game theoretic analysis of delay attacks against time synchronization protocols , 2012, 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings.

[4]  Yixian Xu IPsec security for packet based synchronization , 2011 .

[5]  David L. Mills,et al.  Network Time Protocol Version 4: Autokey Specification , 2010, RFC.

[6]  Tal Mizrahi Time synchronization security using IPsec and MACsec , 2011, 2011 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.

[7]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[8]  Stuart McClure,et al.  Hacking Exposed; Network Security Secrets and Solutions , 1999 .

[9]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[10]  Srdjan Capkun,et al.  Secure Time Synchronization in Sensor Networks , 2008, TSEC.

[11]  David L. Mills,et al.  Internet Engineering Task Force (ietf) Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010 .

[12]  G. Gaderer,et al.  Traps and pitfalls in secure clock synchronization , 2007, 2007 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.

[13]  Albert Treytl,et al.  Secure tunneling of high-precision clock synchronization protocols and other time-stamped data , 2010, 2010 IEEE International Workshop on Factory Communication Systems Proceedings.

[14]  Michael Thomas,et al.  Kerberized Internet Negotiation of Keys (KINK) , 2006, RFC.

[15]  Konstantin Beznosov,et al.  A Security Analysis of the Precise Time Protocol (Short Paper) , 2006, ICICS.