Academia.eduAcademia.edu

Network Time Protocol

description143 papers
group3 followers
lightbulbAbout this topic
Network Time Protocol (NTP) is a networking protocol designed to synchronize the clocks of computers over a packet-switched, variable-latency data network. It enables accurate timekeeping across devices by coordinating time sources and compensating for network delays, ensuring that systems maintain a consistent time reference.
lightbulbAbout this topic
Network Time Protocol (NTP) is a networking protocol designed to synchronize the clocks of computers over a packet-switched, variable-latency data network. It enables accurate timekeeping across devices by coordinating time sources and compensating for network delays, ensuring that systems maintain a consistent time reference.

Key research themes

1. How does time synchronization operate in distributed networks and wireless sensor environments, and why is it crucial?

This research area focuses on understanding time synchronization protocols and mechanisms in distributed systems such as wireless sensor networks (WSNs). Synchronization is vital for accurate data collection, reliable communication, energy efficiency, and enabling advanced functionalities like localization and detection. The challenges include clock drift, multi-hop communication, and energy constraints. Insights here inform the design of synchronization protocols optimized for distributed network characteristics and application needs.

Key finding: This paper establishes that accurate time synchronization across sensor nodes is fundamental for reliable data in WSNs, enabling communication protocols like TDMA and applications such as movement detection. It highlights... Read more
Key finding: This paper describes the architecture and algorithms of NTP designed for synchronizing clocks within large, heterogeneous Internet systems. It demonstrates that despite variable network delays and failures, NTP can maintain... Read more
Key finding: The work formalizes NTP's design and implementation as a hierarchical master-slave configuration capable of nanosecond-level precision under ideal conditions. It introduces returnable-time design principles relying on offset... Read more

2. What are the advancements and challenges in Precision Time Protocol (PTP) and Time Sensitive Networking (TSN) for industrial real-time Ethernet synchronization?

This theme explores the evolution of time synchronization standards and implementations in deterministic industrial Ethernet networks. It includes the development and deployment of IEEE 1588 PTP, TSN standards like IEEE 802.1AS, and their applications in fields requiring strict latency and reliability guarantees. Challenges addressed include integration with Linux systems, security, interoperability, and the convergence of IT and OT networks, reflecting industrial Internet of Things (IIoT) needs.

Key finding: This paper presents a novel simulation model for PTP within the OMNeT++ INET framework that supports evaluation of synchronization accuracy under varying network loads and quality-of-service (QoS) conditions. The authors... Read more
Key finding: This study reports the practical implementation of two key TSN standards—IEEE 802.1AS for clock synchronization and IEEE 802.1Qbv for time scheduled traffic—within Linux endpoints and specialized PCIe hardware. The work... Read more
Key finding: The paper provides an overview of TSN as a set of IEEE 802 standards enhancing Ethernet to support real-time, deterministic communications. It emphasizes TSN’s role in enabling multi-vendor interoperability, lowest latency,... Read more
Key finding: This foundational paper outlines the design principles and requirements of IEEE 1588 standard (PTP), catering to the synchronization needs of industrial control systems with stringent timing constraints. It details... Read more

3. How can security vulnerabilities and timing attack mitigations be addressed in time synchronization protocols and industrial control systems?

This theme centers on evaluating security risks related to time synchronization protocols and networks used in industrial and IoT environments, including NTP spoofing and coordinated jamming in WirelessHART sensor networks. It further investigates scheduling randomization approaches and authentication mechanisms (e.g., GNSS signal authentication) to enhance resilience against timing-based attacks, preserving system stability and confidentiality.

Key finding: The paper introduces an online, distributed schedule randomization (DSR) method for WirelessHART networks used in industrial control systems, aiming to prevent timing attacks like selective jamming that exploit predictable... Read more
Key finding: This study empirically examines security vulnerabilities originating from manipulation of Network Time Protocol (NTP) in IoT environments involving Google Home and smart devices connected via IFTTT. It demonstrates that... Read more
Key finding: Proposing a secure timing protocol that relies solely on authenticated GNSS signals from Galileo’s OS-NMA and Assisted Commercial Authentication Service (ACAS), this paper tackles vulnerabilities of GNSS-based time... Read more

All papers in Network Time Protocol

The time is very important in the life and has a special significance for hospitals, Where is specially used in operating rooms, Nurse Call System (NCS) , various medical tests and many other medical services. Those important things are... more
Named Data Networking (NDN) architectural features, including multicast data delivery, stateful forwarding, and in-network data caching, have shown promise for applications such as video streaming and file sharing. However, collaborative... more
Named Data Networking (NDN) architectural features, including multicast data delivery, stateful forwarding, and in-network data caching, have shown promise for applications such as video streaming and file sharing. However, collaborative... more
This report describes proposed changes in the security model and authentication scheme for the Network Time Protocol Version 4, which is an enhanced version of the current Versing 3. The changes are intended to replace the need to... more
Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, the Internet Engineering Task Force (IETF) has defined a DNS Security Extension (DNSSEC) to... more
Distributed Denial-of-Service DDoS attacks have posed a challenge to Domain Name Systems DNS servers for many years. Surprisingly, no comprehensive solution has been found to protect against such attacks. In this paper, we proposed an... more
Accurate, reliable timestamping which is also convenient and inexpensive is needed in many important areas including real-time network applications and network measurement. Recently the TSC register, which counts CPU cycles in popular PC... more
Ultra-high-resolution tiled display walls are typically driven by a cluster of computers. Each computer may drive one or more displays. Synchronization between the computers is necessary to ensure that animated imagery displayed on the... more
View image, dig sector, and "digability" data products generated onboard the lander. 2. Given a set of raw images from a stereo pair of mast cameras, generate image, dig sector, and dig hazard products identical to what would be generated... more
This paper presents and evaluates a high-precision, one-way, master-to-slave time synchronization protocol to minimize the clock time skew in low-power wearable sensor networks. The protocol is implemented in the MAC layer, and is based... more
The telecommunication networks of telecontrol systems in electric utilities have undergone an innovation process. This has removed many of their technical restrictions and made it possible to consider carrying out telecontrol tasks with... more
We identify two attacks on the Network Time Protocol (NTP)'s cryptographically-authenticated broadcast mode. First, we present a replay attack that allows an on-path attacker to indefinitely stick a broadcast client to a specific time.... more
We explore the risk that network attackers can exploit unauthenticated Network Time Protocol (NTP) traffic to alter the time on client systems. We first discuss how an onpath attacker, that hijacks traffic to an NTP server, can quickly... more
Mizrahi and others on various aspects of Internet protocols and security and the complexities involved in standardization processes. My time at Boston University would not have been as much fun and worthy without my friends
For decades, the Network Time Protocol (NTP) has been used to synchronize computer clocks over untrusted network paths. This work takes a new look at the security of NTP's datagram protocol. We argue that NTP's datagram protocol in... more
RFC 5905 [RFC5905] states that Network Time Protocol (NTP) packets should be authenticated by appending a 128-bit key to the NTP data, and hashing the result with MD5 to obtain a 128-bit tag. This document deprecates MD5-based... more
We consider the problem of sending messages into the future, commonly known as timed release cryptography. Existing schemes for this task either solve the relative time problem with uncontrollable, coarse-grained release time (time-lock... more
This study is the further research into previous study and there are changes made. The first change is to include the measuring capacity that is Equation (1) and the second change is the amendment to equation (3) relates to correction... more
Unlike traditional data traffic, real time multimedia traffic requires synchronization. Temporal relationships among media must be maintained. Yet delay jitter and the absence of a global clock may disrupt these temporal relationships.... more
We present RT-P2P, a real-time peer-to-peer (P2P) system that allows application-level end-to-end timing requirements to be satisfied in P2P systems. P2P systems are fundamentally characterized by: a large number of geographically... more
This document arguments and requests re-allocation of an UDP port number from the System Ports range for a Reflector in Two-Way Active Measurement Protocol (TWAMP). This document, if accepted, will be an update to the TWAMP Test protocol... more
This document describes an OPTIONAL feature for active performance measurement protocols allowing use of the Precision Time Protocol time stamp format defined in IEEE-1588v2-2008, as an alternative to the Network Time Protocol that is... more
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and... more
Precise time synchronization is expected to play a key role in emerging distributed and real-time applications such as the smart grid and Internet of Things (IoT) based applications. The Precision Time Protocol (PTP) is currently viewed... more
The Proximity-1 Space Link Interleaved Time Synchronization (PITS) protocol provides time distribution and synchronization services for space systems. A software prototype implementation of the PITS algorithm has been developed that also... more
___ Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many... more
Synchronization is required in all types of wireless sensor networks in any situation that requires time-based collaboration of one or more of the nodes of the network. A major example of this need for synchronization is a position... more
___ Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many... more
___ Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many... more
Having in mind multimedia systems applications, we propose a novel model-based approach to estimate the clock-offset between two nodes on the Internet. Different than current clock-offset schemes in the literature, which are iterative in... more
Precise time synchronization has become a critical component of modern power systems. There are several available methods for synchronizing the intelligent electronic devices (IEDs) in a power system. In recent years, there has been great... more
With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well... more
This paper describes a series of experiments involving over 100,000 hosts of the Internet system and located in the U.S., Europe and the Pacific. The experiments are designed to evaluate the availability, accuracy and reliability of... more
In Heterogeneous Network (HetNet) for LTE/LTE-A system femtocells (HeNodeBs) are designed and implemented to extend coverage and capacity. The arbitrary usage of HeNodeBs supported for indoor coverage is linked through a third-party... more
The telecommunication networks of telecontrol systems in electric utilities have undergone an innovation process. This has removed many of their technical restrictions and made it possible to consider carrying out telecontrol tasks with... more
Homogenization of the higher education area in accordance to the Bologna process is one of the priority task in both countries. Faculties especially responsible for education of surveyors in both countries have started to develop new... more
Precise time synchronization has become a critical component of modern power systems. There are several available methods for synchronizing the intelligent electronic devices (IEDs) in a power system. In recent years, there has been great... more
This paper presents the complete design and implementation of a low-cost, low-footprint, network time protocol server core for field programmable gate arrays. The core uses a carefully designed modular architecture, which is fully... more
We present a detailed re-examination of the problem of inexpensive yet accurate clock synchronization for networked devices. Based on an empirically validated, parsimonious abstraction of the CPU oscillator as a timing source, accessible... more
The femtocell network allows connecting to cellular network through broadband connection. In femtocell, time with network synchronization becomes a critical issue at present. Synchronization is a process which is required in the femtocell... more
Download research papers for free!