By Topic

Secure tunneling of high-precision clock synchronization protocols and other time-stamped data

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Treytl, A. ; Inst. for Integrated Sensor Syst., Austrian Acad. of Sci., Wiener Neustadt, Austria ; Hirschler, B. ; Sauter, T.

This article analyzes the viability of secure tunneling for clock synchronization protocols with special respect to high-precision clock synchronization requiring hardware timestamping. It investigates whether security mechanisms introduced to protect timing information have an impact on the precision of clock synchronization. Two reference designs - one for an MII-based and one for a MAC-based time stamper - are used together with IPsec as a commonly used and favored secure tunneling protocol. Results of these investigations show that a straightforward application of the IPsec tunnel is not possible, yet there exist several possibilities to meet the requirements of secure high-precision hardware-supported clock synchronization together with IPsec, each however tied to special boundary conditions.

Published in:

Factory Communication Systems (WFCS), 2010 8th IEEE International Workshop on

Date of Conference:

18-21 May 2010