Security flaws and workarounds for IEEE 1588 (transparent) clocks
Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity che...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Treytl, A. Hirschler, B. |
description | Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter measures that protect protocol addresses and prevent the misuse of security associations to replay IEEE 1588 messages. |
doi_str_mv | 10.1109/ISPCS.2009.5340204 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5340204</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5340204</ieee_id><sourcerecordid>5340204</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-1e1b7f0e7f69440495b8dd3f1c9ce8b1f0935351fe42feb4b9a1058c9c8d8a943</originalsourceid><addsrcrecordid>eNo1kMFKw0AURUe0YFvzA7qZpS5S38u8MfOWpUQtFBTShbsySWYgtiZlJqX071Wsq8vlcM_iCnGLMEMEflyW74tylgHwTCuCDOhCTJAyIlKcfVyKhHPz39FciTEycQoK9EhMfncMWW70tUhi_AQAhcYw67GYl64-hHY4Sb-zxyht18hjH7Y29IeuidL3QS6LopCojZH3Q7Bd3NvguuFB1ru-3sYbMfJ2F11yzqlYPxfrxWu6entZLuartGUYUnRY5R5c7p-YCIh1ZZpGeay5dqZCD6y00ugdZd5VVLFF0OaHmsZYJjUVd3_a1jm32Yf2y4bT5vyG-gYqkE3f</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security flaws and workarounds for IEEE 1588 (transparent) clocks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Treytl, A. ; Hirschler, B.</creator><creatorcontrib>Treytl, A. ; Hirschler, B.</creatorcontrib><description>Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter measures that protect protocol addresses and prevent the misuse of security associations to replay IEEE 1588 messages.</description><identifier>ISSN: 1949-0305</identifier><identifier>ISBN: 9781424443918</identifier><identifier>ISBN: 1424443911</identifier><identifier>EISBN: 142444392X</identifier><identifier>EISBN: 9781424443925</identifier><identifier>DOI: 10.1109/ISPCS.2009.5340204</identifier><identifier>LCCN: 2009902785</identifier><language>eng</language><publisher>IEEE</publisher><subject>clock synchronisation ; Clocks ; Communication system security ; IEEE 1588 ; Information security ; Jitter ; MAC modification ; Master-slave ; Peer to peer computing ; Protection ; Protocols ; Security ; security association flaws ; Synchronization ; transparent clocks ; Wireless sensor networks</subject><ispartof>2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, 2009, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5340204$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5340204$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Treytl, A.</creatorcontrib><creatorcontrib>Hirschler, B.</creatorcontrib><title>Security flaws and workarounds for IEEE 1588 (transparent) clocks</title><title>2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication</title><addtitle>ISPCS</addtitle><description>Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter measures that protect protocol addresses and prevent the misuse of security associations to replay IEEE 1588 messages.</description><subject>clock synchronisation</subject><subject>Clocks</subject><subject>Communication system security</subject><subject>IEEE 1588</subject><subject>Information security</subject><subject>Jitter</subject><subject>MAC modification</subject><subject>Master-slave</subject><subject>Peer to peer computing</subject><subject>Protection</subject><subject>Protocols</subject><subject>Security</subject><subject>security association flaws</subject><subject>Synchronization</subject><subject>transparent clocks</subject><subject>Wireless sensor networks</subject><issn>1949-0305</issn><isbn>9781424443918</isbn><isbn>1424443911</isbn><isbn>142444392X</isbn><isbn>9781424443925</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kMFKw0AURUe0YFvzA7qZpS5S38u8MfOWpUQtFBTShbsySWYgtiZlJqX071Wsq8vlcM_iCnGLMEMEflyW74tylgHwTCuCDOhCTJAyIlKcfVyKhHPz39FciTEycQoK9EhMfncMWW70tUhi_AQAhcYw67GYl64-hHY4Sb-zxyht18hjH7Y29IeuidL3QS6LopCojZH3Q7Bd3NvguuFB1ru-3sYbMfJ2F11yzqlYPxfrxWu6entZLuartGUYUnRY5R5c7p-YCIh1ZZpGeay5dqZCD6y00ugdZd5VVLFF0OaHmsZYJjUVd3_a1jm32Yf2y4bT5vyG-gYqkE3f</recordid><startdate>200910</startdate><enddate>200910</enddate><creator>Treytl, A.</creator><creator>Hirschler, B.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200910</creationdate><title>Security flaws and workarounds for IEEE 1588 (transparent) clocks</title><author>Treytl, A. ; Hirschler, B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-1e1b7f0e7f69440495b8dd3f1c9ce8b1f0935351fe42feb4b9a1058c9c8d8a943</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>clock synchronisation</topic><topic>Clocks</topic><topic>Communication system security</topic><topic>IEEE 1588</topic><topic>Information security</topic><topic>Jitter</topic><topic>MAC modification</topic><topic>Master-slave</topic><topic>Peer to peer computing</topic><topic>Protection</topic><topic>Protocols</topic><topic>Security</topic><topic>security association flaws</topic><topic>Synchronization</topic><topic>transparent clocks</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Treytl, A.</creatorcontrib><creatorcontrib>Hirschler, B.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Treytl, A.</au><au>Hirschler, B.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security flaws and workarounds for IEEE 1588 (transparent) clocks</atitle><btitle>2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication</btitle><stitle>ISPCS</stitle><date>2009-10</date><risdate>2009</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1949-0305</issn><isbn>9781424443918</isbn><isbn>1424443911</isbn><eisbn>142444392X</eisbn><eisbn>9781424443925</eisbn><abstract>Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter measures that protect protocol addresses and prevent the misuse of security associations to replay IEEE 1588 messages.</abstract><pub>IEEE</pub><doi>10.1109/ISPCS.2009.5340204</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1949-0305 |
ispartof | 2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, 2009, p.1-6 |
issn | 1949-0305 |
language | eng |
recordid | cdi_ieee_primary_5340204 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | clock synchronisation Clocks Communication system security IEEE 1588 Information security Jitter MAC modification Master-slave Peer to peer computing Protection Protocols Security security association flaws Synchronization transparent clocks Wireless sensor networks |
title | Security flaws and workarounds for IEEE 1588 (transparent) clocks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T03%3A55%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20flaws%20and%20workarounds%20for%20IEEE%201588%20(transparent)%20clocks&rft.btitle=2009%20International%20Symposium%20on%20Precision%20Clock%20Synchronization%20for%20Measurement,%20Control%20and%20Communication&rft.au=Treytl,%20A.&rft.date=2009-10&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1949-0305&rft.isbn=9781424443918&rft.isbn_list=1424443911&rft_id=info:doi/10.1109/ISPCS.2009.5340204&rft_dat=%3Cieee_6IE%3E5340204%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=142444392X&rft.eisbn_list=9781424443925&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5340204&rfr_iscdi=true |