2011 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication 2011
DOI: 10.1109/ispcs.2011.6070159
|View full text |Cite
|
Sign up to set email alerts
|

A packet filtering mechanism with a packet delay distribution estimation function for IEEE 1588 time synchronization in a congested network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…P ACKET-BASED time synchronization techniques based on the IEEE 1588 Precision Time Protocol (PTP) are being increasingly considered as a means of providing microsecondlevel synchronization between cell towers in 4G LTE (Long Term Evolution) mobile networks [2]- [6]. Such a high degree of synchronization accuracy is a necessity in 4G networks since it helps ensure seamless handovers between cell towers, helps reduce inter-cell interference, and also enables the use of MIMO techniques to improve capacity [7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…P ACKET-BASED time synchronization techniques based on the IEEE 1588 Precision Time Protocol (PTP) are being increasingly considered as a means of providing microsecondlevel synchronization between cell towers in 4G LTE (Long Term Evolution) mobile networks [2]- [6]. Such a high degree of synchronization accuracy is a necessity in 4G networks since it helps ensure seamless handovers between cell towers, helps reduce inter-cell interference, and also enables the use of MIMO techniques to improve capacity [7].…”
Section: Introductionmentioning
confidence: 99%
“…The IEEE 1588 PTP standard [10] and related literature prescribe the use of simple POE schemes such as the sample mean, minimum and maximum filtering schemes. Several recent papers [2], [6], [7] have studied methods to improve the performance of these schemes. However, it is not well understood as to how close these POE schemes come to achieving the best possible performance.…”
Section: Introductionmentioning
confidence: 99%
“…With regard to the distribution of packet sizes in background traffic, we consider Traffic Models 1 (TM1) and 2 (TM2) from the ITU-T recommendation G.8261 [2] for cross traffic flows, as specified in Table I. For inline traffic flows, we consider a third traffic model where packet sizes are uniformly distributed between 64 and 1500 bytes [7]. We assume that the interarrival times between packets in all background traffic flows follow exponential distributions.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Mitigation The most basic mitigation for this attack is to add thresholds on the legal message delay ratio, as suggested in [20]: As can be seen in Figure 2, these techniques are already implemented in PTPd, resulting in extended attack efforts to create even a small time change at the target. With these countermeasures the adversary's ability to control the target's time is limited and demands a large effort, both in time and in message count.…”
Section: Delay Spoofing Attack Scenariomentioning
confidence: 99%