mdh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Game theory applied to secure clock synchronization with IEEE 1588
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.ORCID iD: 0000-0003-2018-0996
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.ORCID iD: 0000-0001-6497-4099
TTech Computertecnik AG, Vienna, Austria.
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.ORCID iD: 0000-0002-7159-7508
Show others and affiliations
2016 (English)In: IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, ISPCS, 2016Conference paper (Refereed)
Abstract [en]

Industrial applications usually have real-time requirements or high precision timing demands. For such applications, clock synchronization is one of the main assets that needs to be protected against malicious attacks. To provide sufficient accuracy for distributed time-critical applications, appropriate techniques for preventing or mitigating delay attacks that breach clock synchronization are needed. In this paper, we apply game theory to investigate possible strategies of an adversary, performing attacks targeting clock synchronization on the one hand and a network monitor, aiming to detect anomalies introduced by the adversary on the other. We investigate the interconnection of payoffs for both sides and propose the quarantine mode as a mitigation technique. Delay attacks with constant, linearly increasing, and randomly introduced delays are considered, and we show how the adversary strategy can be estimated by evaluating the detection coefficient, giving the network monitor the possibility to deploy appropriate protection techniques.

Place, publisher, year, edition, pages
2016.
Keyword [en]
clock synchronization, delay attack, game theory, Clocks, Mechanical clocks, Standards, Synchronization, Appropriate techniques, Detection coefficient, Mitigating delays, Mitigation techniques, Protection techniques, Real time requirement
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:mdh:diva-33541DOI: 10.1109/ISPCS.2016.7579509ISI: 000391250300012ScopusID: 2-s2.0-84992360005ISBN: 9781467396141 (print)OAI: oai:DiVA.org:mdh-33541DiVA: diva2:1047331
Conference
10th IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, ISPCS 2016, 4 September 2016 through 9 September 2016
Available from: 2016-11-17 Created: 2016-11-10 Last updated: 2017-02-02Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Lisova, ElenaUhlemann, ElisabethÅkerberg, JohanBjörkman, Mats
By organisation
Embedded Systems
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 5 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf