2016 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS) 2016
DOI: 10.1109/ispcs.2016.7579509
|View full text |Cite
|
Sign up to set email alerts
|

Game theory applied to secure clock synchronization with IEEE 1588

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…A threshold can be derived for the LID attack by considering the Neyman-Pearson lemma under the assumption that two scenarios are possible, namely: H 1 -there is LID attack or H 0there is no attack, NA. Previously, we showed how the PDF of the offset measured in a node can be calculated for the considered types of delay attacks [9]. The detection coefficient was introduced to indicate the difference visible in the PDF when the network is under the attack and to show the level of adversary exposure.…”
Section: Thresholding Indicatorsmentioning
confidence: 99%
See 4 more Smart Citations
“…A threshold can be derived for the LID attack by considering the Neyman-Pearson lemma under the assumption that two scenarios are possible, namely: H 1 -there is LID attack or H 0there is no attack, NA. Previously, we showed how the PDF of the offset measured in a node can be calculated for the considered types of delay attacks [9]. The detection coefficient was introduced to indicate the difference visible in the PDF when the network is under the attack and to show the level of adversary exposure.…”
Section: Thresholding Indicatorsmentioning
confidence: 99%
“…However, this solution requires changes to the standards. We have proposed to use distributed monitoring as a tool to detect that the network is under attack, and to prevent propagation of adversary influence by deploying relevant mitigation techniques [9]. This paper is a continuation of our work [9], where a game theory framework was proposed to investigate the interaction between a monitor and an adversary.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations