{"title":"增强IIoT网络的IEEE 1588 PTP安全性:一个轻量级的攻击检测和缓解框架","authors":"Zeba Idrees , Shahid Latif , Hira Tahir , Lirong Zheng","doi":"10.1016/j.iot.2025.101669","DOIUrl":null,"url":null,"abstract":"<div><div>Highly precise clock synchronization is an important aspect of the Industrial Internet of Things (IIoT) network because desynchronized clocks among nodes in IIoT can degrade system performance and even lead to system failure. IEEE 1588 Precision Time Protocol (PTP) is widely used in such time-sensitive networks. Resource efficiency and security have become the most important concerns in designing PTP for IIoT applications. PTP provides unified and high-precision time, whereas it is resource inefficient and insecure in its current form, particularly for resource-constrained IoT devices, such as battery powered sensing nodes. To this end, this paper aims to advance the existing PTP to improve security for IIoT networks without involving complex and power-consuming cryptographic algorithms. We study and analyze the potential cyber-attacks that can affect the security and synchronization of the PTP network. Considering the limitations of the PTP security defined by IEEE 1588 in its Annex K, we propose a security extension to the PTP algorithm. This security model covers the full PTP attack surface and allows the detection of attacks on all the PTP nodes in a timely manner. Along with the attack detection, we establish an attack mitigation model to mitigate the attack effects on Master PTP nodes. The proposed secure PTP model was evaluated under different network conditions and with varying important parameters. It was observed that newly introduced functions do not compromise synchronization accuracy. All the experimental evaluations demonstrate that the proposed approach is more secure and robust to cyber-attacks and does not affect the operation of PTP devices in all considered network configurations.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"33 ","pages":"Article 101669"},"PeriodicalIF":7.6000,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing IEEE 1588 PTP security for IIoT networks: A lightweight attack detection and mitigation framework\",\"authors\":\"Zeba Idrees , Shahid Latif , Hira Tahir , Lirong Zheng\",\"doi\":\"10.1016/j.iot.2025.101669\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Highly precise clock synchronization is an important aspect of the Industrial Internet of Things (IIoT) network because desynchronized clocks among nodes in IIoT can degrade system performance and even lead to system failure. IEEE 1588 Precision Time Protocol (PTP) is widely used in such time-sensitive networks. Resource efficiency and security have become the most important concerns in designing PTP for IIoT applications. PTP provides unified and high-precision time, whereas it is resource inefficient and insecure in its current form, particularly for resource-constrained IoT devices, such as battery powered sensing nodes. To this end, this paper aims to advance the existing PTP to improve security for IIoT networks without involving complex and power-consuming cryptographic algorithms. We study and analyze the potential cyber-attacks that can affect the security and synchronization of the PTP network. Considering the limitations of the PTP security defined by IEEE 1588 in its Annex K, we propose a security extension to the PTP algorithm. This security model covers the full PTP attack surface and allows the detection of attacks on all the PTP nodes in a timely manner. Along with the attack detection, we establish an attack mitigation model to mitigate the attack effects on Master PTP nodes. The proposed secure PTP model was evaluated under different network conditions and with varying important parameters. It was observed that newly introduced functions do not compromise synchronization accuracy. All the experimental evaluations demonstrate that the proposed approach is more secure and robust to cyber-attacks and does not affect the operation of PTP devices in all considered network configurations.</div></div>\",\"PeriodicalId\":29968,\"journal\":{\"name\":\"Internet of Things\",\"volume\":\"33 \",\"pages\":\"Article 101669\"},\"PeriodicalIF\":7.6000,\"publicationDate\":\"2025-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Internet of Things\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2542660525001830\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660525001830","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Enhancing IEEE 1588 PTP security for IIoT networks: A lightweight attack detection and mitigation framework
Highly precise clock synchronization is an important aspect of the Industrial Internet of Things (IIoT) network because desynchronized clocks among nodes in IIoT can degrade system performance and even lead to system failure. IEEE 1588 Precision Time Protocol (PTP) is widely used in such time-sensitive networks. Resource efficiency and security have become the most important concerns in designing PTP for IIoT applications. PTP provides unified and high-precision time, whereas it is resource inefficient and insecure in its current form, particularly for resource-constrained IoT devices, such as battery powered sensing nodes. To this end, this paper aims to advance the existing PTP to improve security for IIoT networks without involving complex and power-consuming cryptographic algorithms. We study and analyze the potential cyber-attacks that can affect the security and synchronization of the PTP network. Considering the limitations of the PTP security defined by IEEE 1588 in its Annex K, we propose a security extension to the PTP algorithm. This security model covers the full PTP attack surface and allows the detection of attacks on all the PTP nodes in a timely manner. Along with the attack detection, we establish an attack mitigation model to mitigate the attack effects on Master PTP nodes. The proposed secure PTP model was evaluated under different network conditions and with varying important parameters. It was observed that newly introduced functions do not compromise synchronization accuracy. All the experimental evaluations demonstrate that the proposed approach is more secure and robust to cyber-attacks and does not affect the operation of PTP devices in all considered network configurations.
期刊介绍:
Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT.
The journal will place a high priority on timely publication, and provide a home for high quality.
Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.