Redundant Schemes or How to Counter the Delay Attack on Time Synchronization Protocols
暂无分享,去创建一个
[1] Stefan Milius,et al. An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms , 2016, ICISS.
[2] A. Komes,et al. IEEE 1588 for redundant ethernet networks , 2012, 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings.
[3] Brian Weis,et al. The Group Domain of Interpretation , 2003, RFC.
[4] Cristian Marinescu,et al. Design and implementation of a PTP clock infrastructure for the Linux kernel , 2010, 2010 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.
[5] Ran Canetti,et al. Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction , 2005, RFC.
[6] Tal Mizrahi,et al. Security Requirements of Time Protocols in Packet Switched Networks , 2014, RFC.
[7] Kang Lee,et al. IEEE 1588 standard for a precision clock synchronization protocol for networked measurement and control systems , 2002, 2nd ISA/IEEE Sensors for Industry Conference,.
[8] Radim Bartos,et al. Implementing Proposed IEEE 1588 Integrated Security Mechanism , 2018, 2018 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS).
[9] Mourad Debbabi,et al. A Detection and Mitigation Model for PTP Delay Attack in an IEC 61850 Substation , 2018, IEEE Transactions on Smart Grid.
[10] Anders Wallin,et al. Redundant secure timing sources and timing distribution to digital power protection and control applications , 2020 .
[11] Jean-Yves Le Boudec,et al. Cyber-attack on packet-based time synchronization protocols: The undetectable Delay Box , 2016, 2016 IEEE International Instrumentation and Measurement Technology Conference Proceedings.