Practical application of 1588 security | IEEE Conference Publication | IEEE Xplore