2021
DOI: 10.1109/access.2021.3107203
|View full text |Cite
|
Sign up to set email alerts
|

A Security Management Architecture for Time Synchronization Towards High Precision Networks

Abstract: Time synchronization is quickly becoming a fundamental prerequisite for a smart society. With the development of the fifth-generation (5G) network, time-sensitive networking (TSN), and the rise of highprecision networks, its accurate and reliable features have attracted an increasing amount of attention. As the most promising protocol with sub-microsecond accuracy, precision time protocol (PTP) has been widely used for network synchronization, and its proper operation and security are critical to the industrie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…𝑀 𝐻𝑊𝑃 (𝐴 𝜃 ) = 𝐼 (7) where, 𝐼 is the identity matrix, Any quantum communication protocol that requires to be secured from eavesdropping attempts must pass a security analysis, which is a crucial part of the evaluation process. Security analysis is widely used by researchers to evaluate the security requirements of their protocols and ascertain whether an eavesdropper has a chance to be around [32]- [34]. The security analysis is explained in detail.…”
Section: A Simulation Setupmentioning
confidence: 99%
“…𝑀 𝐻𝑊𝑃 (𝐴 𝜃 ) = 𝐼 (7) where, 𝐼 is the identity matrix, Any quantum communication protocol that requires to be secured from eavesdropping attempts must pass a security analysis, which is a crucial part of the evaluation process. Security analysis is widely used by researchers to evaluate the security requirements of their protocols and ascertain whether an eavesdropper has a chance to be around [32]- [34]. The security analysis is explained in detail.…”
Section: A Simulation Setupmentioning
confidence: 99%
“…Since the central architecture of Software Defined Networking (SDN) paradigm may be beneficial to increase the security level in a network, TSN and SDN technologies can be combined in order to enhance the security aspect of real-time communication [28]. Li et al [29] proposes a methodology, which relies on SDN/NFV (Network Functions Virtualization) combining network state and time synchronization information to detect and mitigate the attacks against Precision Time Protocol.…”
Section: Security In Tsnmentioning
confidence: 99%
“…1) The longer communication distance requires robust delay compensation; 2) The air interface protocol stack reduces the delay compensation accuracy of technologies such as PTP; 3) The larger and complex topologies requires low hardware and bandwidth overhead of timing functions; 4) The high-precision absolute time delivery should basically be compatible with 3GPP standards. Therefore, achieving sub-microsecond timing accuracy in mobile network with large-scale equipments in diverse scenarios at low cost challenges all the traditional methods [23] [24]. Their inability to simultaneously meet the demands in terms of precision, flexibility and cost has greatly hindered the realization of the vertical applications mentioned above.…”
Section: Introductionmentioning
confidence: 99%