Security flaws and workarounds for IEEE 1588 (transparent) clocks

Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity che...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Treytl, A., Hirschler, B.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Treytl, A.
Hirschler, B.
description Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter measures that protect protocol addresses and prevent the misuse of security associations to replay IEEE 1588 messages.
doi_str_mv 10.1109/ISPCS.2009.5340204
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5340204</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5340204</ieee_id><sourcerecordid>5340204</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-1e1b7f0e7f69440495b8dd3f1c9ce8b1f0935351fe42feb4b9a1058c9c8d8a943</originalsourceid><addsrcrecordid>eNo1kMFKw0AURUe0YFvzA7qZpS5S38u8MfOWpUQtFBTShbsySWYgtiZlJqX071Wsq8vlcM_iCnGLMEMEflyW74tylgHwTCuCDOhCTJAyIlKcfVyKhHPz39FciTEycQoK9EhMfncMWW70tUhi_AQAhcYw67GYl64-hHY4Sb-zxyht18hjH7Y29IeuidL3QS6LopCojZH3Q7Bd3NvguuFB1ru-3sYbMfJ2F11yzqlYPxfrxWu6entZLuartGUYUnRY5R5c7p-YCIh1ZZpGeay5dqZCD6y00ugdZd5VVLFF0OaHmsZYJjUVd3_a1jm32Yf2y4bT5vyG-gYqkE3f</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security flaws and workarounds for IEEE 1588 (transparent) clocks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Treytl, A. ; Hirschler, B.</creator><creatorcontrib>Treytl, A. ; Hirschler, B.</creatorcontrib><description>Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter measures that protect protocol addresses and prevent the misuse of security associations to replay IEEE 1588 messages.</description><identifier>ISSN: 1949-0305</identifier><identifier>ISBN: 9781424443918</identifier><identifier>ISBN: 1424443911</identifier><identifier>EISBN: 142444392X</identifier><identifier>EISBN: 9781424443925</identifier><identifier>DOI: 10.1109/ISPCS.2009.5340204</identifier><identifier>LCCN: 2009902785</identifier><language>eng</language><publisher>IEEE</publisher><subject>clock synchronisation ; Clocks ; Communication system security ; IEEE 1588 ; Information security ; Jitter ; MAC modification ; Master-slave ; Peer to peer computing ; Protection ; Protocols ; Security ; security association flaws ; Synchronization ; transparent clocks ; Wireless sensor networks</subject><ispartof>2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, 2009, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5340204$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5340204$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Treytl, A.</creatorcontrib><creatorcontrib>Hirschler, B.</creatorcontrib><title>Security flaws and workarounds for IEEE 1588 (transparent) clocks</title><title>2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication</title><addtitle>ISPCS</addtitle><description>Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter measures that protect protocol addresses and prevent the misuse of security associations to replay IEEE 1588 messages.</description><subject>clock synchronisation</subject><subject>Clocks</subject><subject>Communication system security</subject><subject>IEEE 1588</subject><subject>Information security</subject><subject>Jitter</subject><subject>MAC modification</subject><subject>Master-slave</subject><subject>Peer to peer computing</subject><subject>Protection</subject><subject>Protocols</subject><subject>Security</subject><subject>security association flaws</subject><subject>Synchronization</subject><subject>transparent clocks</subject><subject>Wireless sensor networks</subject><issn>1949-0305</issn><isbn>9781424443918</isbn><isbn>1424443911</isbn><isbn>142444392X</isbn><isbn>9781424443925</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kMFKw0AURUe0YFvzA7qZpS5S38u8MfOWpUQtFBTShbsySWYgtiZlJqX071Wsq8vlcM_iCnGLMEMEflyW74tylgHwTCuCDOhCTJAyIlKcfVyKhHPz39FciTEycQoK9EhMfncMWW70tUhi_AQAhcYw67GYl64-hHY4Sb-zxyht18hjH7Y29IeuidL3QS6LopCojZH3Q7Bd3NvguuFB1ru-3sYbMfJ2F11yzqlYPxfrxWu6entZLuartGUYUnRY5R5c7p-YCIh1ZZpGeay5dqZCD6y00ugdZd5VVLFF0OaHmsZYJjUVd3_a1jm32Yf2y4bT5vyG-gYqkE3f</recordid><startdate>200910</startdate><enddate>200910</enddate><creator>Treytl, A.</creator><creator>Hirschler, B.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200910</creationdate><title>Security flaws and workarounds for IEEE 1588 (transparent) clocks</title><author>Treytl, A. ; Hirschler, B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-1e1b7f0e7f69440495b8dd3f1c9ce8b1f0935351fe42feb4b9a1058c9c8d8a943</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>clock synchronisation</topic><topic>Clocks</topic><topic>Communication system security</topic><topic>IEEE 1588</topic><topic>Information security</topic><topic>Jitter</topic><topic>MAC modification</topic><topic>Master-slave</topic><topic>Peer to peer computing</topic><topic>Protection</topic><topic>Protocols</topic><topic>Security</topic><topic>security association flaws</topic><topic>Synchronization</topic><topic>transparent clocks</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Treytl, A.</creatorcontrib><creatorcontrib>Hirschler, B.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Treytl, A.</au><au>Hirschler, B.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security flaws and workarounds for IEEE 1588 (transparent) clocks</atitle><btitle>2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication</btitle><stitle>ISPCS</stitle><date>2009-10</date><risdate>2009</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1949-0305</issn><isbn>9781424443918</isbn><isbn>1424443911</isbn><eisbn>142444392X</eisbn><eisbn>9781424443925</eisbn><abstract>Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter measures that protect protocol addresses and prevent the misuse of security associations to replay IEEE 1588 messages.</abstract><pub>IEEE</pub><doi>10.1109/ISPCS.2009.5340204</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1949-0305
ispartof 2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, 2009, p.1-6
issn 1949-0305
language eng
recordid cdi_ieee_primary_5340204
source IEEE Electronic Library (IEL) Conference Proceedings
subjects clock synchronisation
Clocks
Communication system security
IEEE 1588
Information security
Jitter
MAC modification
Master-slave
Peer to peer computing
Protection
Protocols
Security
security association flaws
Synchronization
transparent clocks
Wireless sensor networks
title Security flaws and workarounds for IEEE 1588 (transparent) clocks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T03%3A55%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20flaws%20and%20workarounds%20for%20IEEE%201588%20(transparent)%20clocks&rft.btitle=2009%20International%20Symposium%20on%20Precision%20Clock%20Synchronization%20for%20Measurement,%20Control%20and%20Communication&rft.au=Treytl,%20A.&rft.date=2009-10&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1949-0305&rft.isbn=9781424443918&rft.isbn_list=1424443911&rft_id=info:doi/10.1109/ISPCS.2009.5340204&rft_dat=%3Cieee_6IE%3E5340204%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=142444392X&rft.eisbn_list=9781424443925&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5340204&rfr_iscdi=true