{"title":"针对时间同步协议延迟攻击的博弈论分析","authors":"Tal Mizrahi","doi":"10.1109/ISPCS.2012.6336612","DOIUrl":null,"url":null,"abstract":"Time synchronization protocols have become very common in packet networks, and are consequently exposed to various security attacks. One of the most effective attacks against synchronization protocols is the delay attack, in which a man-in-the-middle attacker selectively delays the time protocol packets. This attack is exceptionally effective, as it cannot be prevented by conventional security measures such as authentication or encryption. In this paper we introduce a new approach to analyzing the delay attack, using a game theoretic model. We analyze the possible strategies of the attacker and attackee, and introduce a novel strategy for mitigating delay attacks using multiple paths between the master and slave clocks. We also discuss the Nash equilibria in our model and their connection to the possible outcomes of real-life attacks.","PeriodicalId":153925,"journal":{"name":"2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings","volume":"4 75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"48","resultStr":"{\"title\":\"A game theoretic analysis of delay attacks against time synchronization protocols\",\"authors\":\"Tal Mizrahi\",\"doi\":\"10.1109/ISPCS.2012.6336612\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Time synchronization protocols have become very common in packet networks, and are consequently exposed to various security attacks. One of the most effective attacks against synchronization protocols is the delay attack, in which a man-in-the-middle attacker selectively delays the time protocol packets. This attack is exceptionally effective, as it cannot be prevented by conventional security measures such as authentication or encryption. In this paper we introduce a new approach to analyzing the delay attack, using a game theoretic model. We analyze the possible strategies of the attacker and attackee, and introduce a novel strategy for mitigating delay attacks using multiple paths between the master and slave clocks. We also discuss the Nash equilibria in our model and their connection to the possible outcomes of real-life attacks.\",\"PeriodicalId\":153925,\"journal\":{\"name\":\"2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings\",\"volume\":\"4 75 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"48\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPCS.2012.6336612\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPCS.2012.6336612","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A game theoretic analysis of delay attacks against time synchronization protocols
Time synchronization protocols have become very common in packet networks, and are consequently exposed to various security attacks. One of the most effective attacks against synchronization protocols is the delay attack, in which a man-in-the-middle attacker selectively delays the time protocol packets. This attack is exceptionally effective, as it cannot be prevented by conventional security measures such as authentication or encryption. In this paper we introduce a new approach to analyzing the delay attack, using a game theoretic model. We analyze the possible strategies of the attacker and attackee, and introduce a novel strategy for mitigating delay attacks using multiple paths between the master and slave clocks. We also discuss the Nash equilibria in our model and their connection to the possible outcomes of real-life attacks.