SecureTime: Secure Multicast Time Synchronization.

作者: Joachim Fabini , Robert Annessi , Tanja Zseby

DOI:

关键词:

摘要: … Such DoS attacks can be conducted, for example, by an adversary sending an excessive … as well as offset correction during a time span to global, fixed values. Those global values, …

参考文章(15)
Thomas Hardjono, Josef Pieprzyk, Jennifer Seberry, Fundamentals of Computer Security ,(2003)
D. Dolev, A. Yao, On the security of public key protocols IEEE Transactions on Information Theory. ,vol. 29, pp. 198- 208 ,(1983) , 10.1109/TIT.1983.1056650
Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang, High-speed high-security signatures Journal of Cryptographic Engineering. ,vol. 2, pp. 77- 89 ,(2012) , 10.1007/S13389-012-0027-1
Naiara Moreira, Jesus Lazaro, Jaime Jimenez, Mikel Idirin, Armando Astarloa, Security mechanisms to protect IEEE 1588 synchronization: State of the art and trends international symposium on precision clock synchronization for measurement control and communication. pp. 115- 120 ,(2015) , 10.1109/ISPCS.2015.7324694
Ran Canetti, Dawn Song, Adrian Perrig, J. D. Tygar, The TESLA Broadcast Authentication Protocol RSA CryptoBytes. ,vol. 5, ,(2002)
A. Perrig, R. Canetti, J.D. Tygar, Dawn Song, Efficient authentication and signing of multicast streams over lossy channels ieee symposium on security and privacy. pp. 56- 73 ,(2000) , 10.1109/SECPRI.2000.848446
Albert Treytl, Bernd Hirschler, Security flaws and workarounds for IEEE 1588 (transparent) clocks international symposium on precision clock synchronization for measurement control and communication. pp. 1- 6 ,(2009) , 10.1109/ISPCS.2009.5340204
Q. Wang, H. Khurana, Y. Huang, K. Nahrstedt, Time Valid One-Time Signature for Time-Critical Multicast Data Authentication international conference on computer communications. pp. 1233- 1241 ,(2009) , 10.1109/INFCOM.2009.5062037
Tal Mizrahi, Security Requirements of Time Protocols in Packet Switched Networks RFC. ,vol. 7384, pp. 1- 36 ,(2014)
Aanchal Malhotra, Sharon Goldberg, Attacking NTP's Authenticated Broadcast Mode acm special interest group on data communication. ,vol. 46, pp. 12- 17 ,(2016) , 10.1145/2935634.2935637