Vulnerability of IEEE 1588 under Time Synchronization Attacks

Mingyu Han, Peter Crossley

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

Abstract

Time Synchronization is critically important in the alignment of signals resulting from a power system event or the measurement of data required to perform a protection and control action. IEEE 1588 Precision Time Protocol (PTP) achieves sub-microsecond accuracy via Ethernet with the aid of hardware timestamping techniques. Although PTP is being deployed in more newly-built IEC 61850 substations, the cybersecurity perspectives are often ignored or receive inadequate attention. Time Synchronization Attacks (TSA) targeting on IEEE 1588 may result in timing errors or cause the loss of synchronization, which may potentially lead to catastrophic failures of monitoring, protection and control applications. In this paper, mathematical analysis is first presented to illustrate the impact of TSA on PTP. A hardware testbed was then implemented to perform TSA including delay attacks, packet modification attacks, spoofing attacks and excessive traffic injection attacks on commercial PTP devices. The characteristics of PTP clocks under attack are compared, and the severity of different types of TSA are discussed.
Original languageEnglish
Title of host publicationIEEE Power & Energy Society General Meeting 2019
Publication statusAccepted/In press - 15 May 2019
EventIEEE PES General Meeting 2019 - Hilton Hotel, Atlanta, United States
Duration: 4 Aug 20198 Aug 2019
http://pes-gm.org/2019/

Conference

ConferenceIEEE PES General Meeting 2019
Abbreviated titleIEEE PES GM 2019
Country/TerritoryUnited States
CityAtlanta
Period4/08/198/08/19
Internet address

Keywords

  • cyber-security
  • IEEE 1588
  • IEC 61850
  • Substations
  • Time synchronization
  • Protection and Control

Fingerprint

Dive into the research topics of 'Vulnerability of IEEE 1588 under Time Synchronization Attacks'. Together they form a unique fingerprint.

Cite this