Game theory applied to secure clock synchronization with IEEE 1588
2016 (English)In: IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, ISPCS, 2016Conference paper (Refereed)
Industrial applications usually have real-time requirements or high precision timing demands. For such applications, clock synchronization is one of the main assets that needs to be protected against malicious attacks. To provide sufficient accuracy for distributed time-critical applications, appropriate techniques for preventing or mitigating delay attacks that breach clock synchronization are needed. In this paper, we apply game theory to investigate possible strategies of an adversary, performing attacks targeting clock synchronization on the one hand and a network monitor, aiming to detect anomalies introduced by the adversary on the other. We investigate the interconnection of payoffs for both sides and propose the quarantine mode as a mitigation technique. Delay attacks with constant, linearly increasing, and randomly introduced delays are considered, and we show how the adversary strategy can be estimated by evaluating the detection coefficient, giving the network monitor the possibility to deploy appropriate protection techniques.
Place, publisher, year, edition, pages
clock synchronization, delay attack, game theory, Clocks, Mechanical clocks, Standards, Synchronization, Appropriate techniques, Detection coefficient, Mitigating delays, Mitigation techniques, Protection techniques, Real time requirement
Electrical Engineering, Electronic Engineering, Information Engineering
IdentifiersURN: urn:nbn:se:mdh:diva-33541DOI: 10.1109/ISPCS.2016.7579509ISI: 000391250300012ScopusID: 2-s2.0-84992360005ISBN: 9781467396141 (print)OAI: oai:DiVA.org:mdh-33541DiVA: diva2:1047331
10th IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, ISPCS 2016, 4 September 2016 through 9 September 2016