mdh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Delay attack versus clock synchronization - A time chase
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.ORCID iD: 0000-0003-2018-0996
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.ORCID iD: 0000-0001-6497-4099
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.ORCID iD: 0000-0002-7159-7508
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.ORCID iD: 0000-0002-2419-2735
2017 (English)In: Proceedings of the IEEE International Conference on Industrial Technology, 2017, p. 1136-1141Conference paper, Published paper (Refereed)
Abstract [en]

Clock synchronization is one of the most essential assets for distributed real-time systems, as sensing, control and actuation require synchronized communication to meet real-time deadlines. We propose a distributed monitoring method to detect if an adversary is interfering with the clock synchronization protocol. The monitor uses certain network indicators and a set of rules to decide about switching between Normal, Quarantine or Attack Detected states. Further, we propose a way to define thresholds for decision-making based on theoretical analysis of the indicator values influenced by an attack. In addition, we formulate the problem of adversary influence detection in the network as a detection theory problem and use it to derive an additional indicator for the network monitor. Finally, we analyze the time chase between the monitor and an adversary to investigate which factors influence the final outcome. 

Place, publisher, year, edition, pages
2017. p. 1136-1141
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:mdh:diva-35632DOI: 10.1109/ICIT.2017.7915522ISI: 000404252400188Scopus ID: 2-s2.0-85019646283ISBN: 9781509053209 (print)OAI: oai:DiVA.org:mdh-35632DiVA, id: diva2:1107228
Conference
2017 IEEE International Conference on Industrial Technology, ICIT 2017, 23 March 2017 through 25 March 2017
Projects
SafeCOP - Safe Cooperating Cyber-Physical Systems using Wireless Communication
Funder
EU, Horizon 2020, 692529 VinnovaAvailable from: 2017-06-09 Created: 2017-06-09 Last updated: 2019-04-23Bibliographically approved

Open Access in DiVA

fulltext(769 kB)30 downloads
File information
File name FULLTEXT01.pdfFile size 769 kBChecksum SHA-512
24ef3e411bfcd017c4bb525900bda016cdfc7ab4e722fa70f0fa417b6f4a5596185c0bb7bab13dd354d1ea25627522623da65abe7407da8889527cd0504244f9
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records BETA

Lisova, ElenaUhlemann, ElisabethÅkerberg, JohanMats, Björkman

Search in DiVA

By author/editor
Lisova, ElenaUhlemann, ElisabethÅkerberg, JohanMats, Björkman
By organisation
Embedded Systems
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 30 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 31 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf