{"title":"Practical application of 1588 security","authors":"Albert Treytl, B. Hirschler","doi":"10.1109/ISPCS.2008.4659210","DOIUrl":null,"url":null,"abstract":"Version 2 of IEEE 1588 contains an extension to secure the given service of clock synchronization. This article describes a practical implementation of this extension for a clock synchronization network. Pitfalls also relevant to other implementations and important properties are discussed and performance results that cover normal operation and stress tests such as denial of service attacks are presented. Additionally, important concepts for integration of hardware timestamping and transparent clock support are presented, which are necessary to use the full potential in more complicated applications.","PeriodicalId":428276,"journal":{"name":"2008 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPCS.2008.4659210","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17
Abstract
Version 2 of IEEE 1588 contains an extension to secure the given service of clock synchronization. This article describes a practical implementation of this extension for a clock synchronization network. Pitfalls also relevant to other implementations and important properties are discussed and performance results that cover normal operation and stress tests such as denial of service attacks are presented. Additionally, important concepts for integration of hardware timestamping and transparent clock support are presented, which are necessary to use the full potential in more complicated applications.