{"title":"Time synchronization security using IPsec and MACsec","authors":"Tal Mizrahi","doi":"10.1109/ISPCS.2011.6070153","DOIUrl":null,"url":null,"abstract":"The wide deployment of the IEEE 1588 Precision Time Protocol (PTP) raises significant security concerns; its quick assimilation has outrun security standardization efforts. In the absence of a standard security solution for PTP, several different alternatives have been suggested as a means to fill this vacuum using existing off-the-shelf security protocols. In this paper, we analyze PTP security solutions using two such protocols; IPsec and MACsec. We characterize the common deployment scenarios for PTP using these protocols, and then present a security threat analysis under these scenarios.","PeriodicalId":416451,"journal":{"name":"2011 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"48","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPCS.2011.6070153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 48
Abstract
The wide deployment of the IEEE 1588 Precision Time Protocol (PTP) raises significant security concerns; its quick assimilation has outrun security standardization efforts. In the absence of a standard security solution for PTP, several different alternatives have been suggested as a means to fill this vacuum using existing off-the-shelf security protocols. In this paper, we analyze PTP security solutions using two such protocols; IPsec and MACsec. We characterize the common deployment scenarios for PTP using these protocols, and then present a security threat analysis under these scenarios.