{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T22:54:21Z","timestamp":1768431261738,"version":"3.49.0"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030966263","type":"print"},{"value":"9783030966270","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96627-0_19","type":"book-chapter","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:22:32Z","timestamp":1651839752000},"page":"203-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions"],"prefix":"10.1007","author":[{"given":"Diana Gratiela","family":"Berbecaru","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Lioy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,7]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Ruffini, S., Johansson, M., Pohlman, B., Sandgren, M.: 5G syncronization requirements and solutions. Ericsson Technol. Rev. (2021). https:\/\/www.ericsson.com\/en\/reports-and-papers\/ericsson-technology-review\/articles\/5g-synchronization-requirements-and-solutions","DOI":"10.23919\/ETR.2021.9904655"},{"key":"19_CR2","unstructured":"The ROOT (Rolling Out OSNMA for the Secure Synchronisation of Telecom Networks) Project. https:\/\/www.gnss-root.eu\/"},{"key":"19_CR3","unstructured":"ITU-T Recommendations G.826x and G.827x series (G.8200-G.8299: Synchronization, quality and availability targets. https:\/\/www.itu.int\/ITU-T\/recommendations\/index_sg.aspx?sg=15"},{"key":"19_CR4","unstructured":"IEEE 1588-2019: IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems. Accessed 16 Jun 2020. https:\/\/standards.ieee.org\/standard\/1588-2019.html"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Mills, D., Delaware, U., Martin, J., Burbank, J., Kasch, W.: Network Time Protocol Version 4: Protocol and Algorithms Specification. IETF RFC 5905 (2010)","DOI":"10.17487\/rfc5905"},{"issue":"5","key":"19_CR6","doi-asserted-by":"publisher","first-page":"2172","DOI":"10.1109\/TIM.2019.2918597","volume":"69","author":"C DeCusatis","year":"2020","unstructured":"DeCusatis, C., Lynch, R.M., Kluge, W., Houston, J., Wojciak, P.A., Guendert, S.: Impact of cyberattacks on precision time protocol. IEEE Trans. Instrum. Meas. 69(5), 2172\u20132181 (2020). https:\/\/doi.org\/10.1109\/TIM.2019.2918597","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"19_CR7","doi-asserted-by":"publisher","unstructured":"Dalmas, M., Rachadel, H., Silvano, G., Dutra, C.: Improving PTP robustness to the byzantine failure. In: 2015 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, Beijing, pp. 111\u2013114. https:\/\/doi.org\/10.1109\/ISPCS.2015.7324693","DOI":"10.1109\/ISPCS.2015.7324693"},{"issue":"1","key":"19_CR8","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/TDSC.2017.2748583","volume":"17","author":"E Itkin","year":"2020","unstructured":"Itkin, E., Wool, A.: A security analysis and revised security extension for the precision time protocol. IEEE Trans. Dependable Sec. Comput. 17(1), 22\u201334 (2020). https:\/\/doi.org\/10.1109\/TDSC.2017.2748583","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"19_CR9","doi-asserted-by":"publisher","unstructured":"Barreto, S., Suresh, A., Le Boudec, J.: Cyber-attack on packet-based time synchronization protocols: the undetectable delay box. In: 2016 IEEE International Instrumentation and Measurement Technology Conference, pp. 1\u20136. https:\/\/doi.org\/10.1109\/I2MTC.2016.7520408","DOI":"10.1109\/I2MTC.2016.7520408"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"45211","DOI":"10.1109\/ACCESS.2020.2978337","volume":"8","author":"F Girela-L\u00f3pez","year":"2020","unstructured":"Girela-L\u00f3pez, F., L\u00f3pez-Jim\u00e9nez, J., Jim\u00e9nez-L\u00f3pez, M., Rodr\u00edguez, R., Ros, E., D\u00edaz, J.: IEEE 1588 high accuracy default profile: applications and challenges. IEEE Access 8, 45211\u201345220 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2978337","journal-title":"IEEE Access"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Mizrahi, T.: Security requirements of time protocols in packet switched networks. IETF RFC 7384 (2014)","DOI":"10.17487\/rfc7384"},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1186\/s42400-021-00080-y","volume":"4","author":"W Alghamdi","year":"2021","unstructured":"Alghamdi, W., Schukat, M.: Precision time protocol attack strategies and their resistance to existing security extensions. Cybersecur 4, 12 (2021). https:\/\/doi.org\/10.1186\/s42400-021-00080-y","journal-title":"Cybersecur"},{"key":"19_CR13","doi-asserted-by":"publisher","unstructured":"Pini, M., Minetto, A., Vesco, A., Berbecaru, D., Contreras Murillo, L.M., Nemry, P., De Francesca. I., Rat, B., Callewaert, K.: Satellite-derived time for enhanced telecom networks synchronization: the ROOT project. In: 2021 IEEE 8th International Workshop on Metrology for AeroSpace (MetroAeroSpace), pp. 288\u2013293. https:\/\/doi.org\/10.1109\/MetroAeroSpace51421.2021.9511780","DOI":"10.1109\/MetroAeroSpace51421.2021.9511780"},{"key":"19_CR14","unstructured":"Keylime: Bootstrap & Maintain Trust on the Edge\/Cloud and IoT. https:\/\/keylime.dev\/"},{"key":"19_CR15","doi-asserted-by":"publisher","unstructured":"Estrela, P.V., Neus\u00fc\u00df, S., Owczarek, W.: Using a multi-source NTP watchdog to increase the robustness of PTPv2 in financial industry networks. In: 2014 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, pp. 87\u201392. https:\/\/doi.org\/10.1109\/ISPCS.2014.6948697","DOI":"10.1109\/ISPCS.2014.6948697"},{"key":"19_CR16","doi-asserted-by":"publisher","unstructured":"Alghamdi, W., Schukat, M: Cyber attacks on precision time protocol networks\u2013a case study. Electronics 9, 1398 (2020). https:\/\/doi.org\/10.3390\/electronics9091398","DOI":"10.3390\/electronics9091398"},{"issue":"3","key":"19_CR17","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49\u201351 (2011). https:\/\/doi.org\/10.1109\/MSP.2011.67","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"19_CR18","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1002\/navi.65","volume":"61","author":"C G\u00fcnther","year":"2014","unstructured":"G\u00fcnther, C.: A survey of spoofing and counter-measures. J. Inst. Navig. 61(3), 159\u2013177 (2014). https:\/\/doi.org\/10.1002\/navi.65","journal-title":"J. Inst. Navig."},{"issue":"3","key":"19_CR19","doi-asserted-by":"publisher","first-page":"2118","DOI":"10.1109\/JSYST.2018.2883752","volume":"13","author":"E Falletti","year":"2019","unstructured":"Falletti, E., Margaria, D., Marucco, G., Motella, B., Nicola, M., Pini, M.: Synchronization of critical infrastructures dependent upon GNSS: current vulnerabilities and protection provided by new signals. IEEE Syst. J. 13(3), 2118\u20132129 (2019). https:\/\/doi.org\/10.1109\/JSYST.2018.2883752","journal-title":"IEEE Syst. J."},{"key":"19_CR20","doi-asserted-by":"publisher","unstructured":"Ullmann, M., V\u00f6geler, M.: Delay attacks implication on NTP and PTP time synchronization. In: 2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ISPCS.2009.5340224","DOI":"10.1109\/ISPCS.2009.5340224"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Ylonen, T., Lonvick, C.: The Secure Shell (SSH) Connection Protocol. IETF RFC 4254 (2006)","DOI":"10.17487\/rfc4254"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol version 1.3. IETF RFC 8446 (2018)","DOI":"10.17487\/RFC8446"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Rigney, C., Willens, S., Rubens, A., Simpson, W.: Remote Authentication Dial In User Service (RADIUS). IETF RFC 2865 (2000)","DOI":"10.17487\/rfc2865"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Levi, D., Meyer, P., Stewart, B.: Simple Network Management Protocol (SNMP) Application. IETF RFC 3413 (2002)","DOI":"10.17487\/rfc3413"},{"key":"19_CR25","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1002\/spe.2148","volume":"43","author":"D Berbecaru","year":"2013","unstructured":"Berbecaru, D., Casalino, M.M., Lioy, A.: FcgiOCSP: a scalable OCSP-based certificate validation system exploiting the FastCGI interface. Softw. Pract. Exper. 43, 1489\u20131518 (2013). https:\/\/doi.org\/10.1002\/spe.2148","journal-title":"Softw. Pract. Exper."},{"issue":"6","key":"19_CR26","doi-asserted-by":"publisher","first-page":"1233","DOI":"10.1109\/JPROC.2016.2543266","volume":"104","author":"D Borio","year":"2016","unstructured":"Borio, D., Dovis, F., Kuusniemi, H., Lo Presti, L.: Impact and detection of GNSS jammers on consumer grade satellite navigation receivers. Proc. IEEE 104(6), 1233\u20131245 (2016). https:\/\/doi.org\/10.1109\/JPROC.2016.2543266","journal-title":"Proc. IEEE"},{"key":"19_CR27","doi-asserted-by":"publisher","unstructured":"Alghamdi, W., Schukat, M.: A Detection model against precision time protocol attacks. In: 2020 3rd International Conference on Computer Applications & Information Security, Riyadh, Saudi Arabia, pp. 1\u20133. https:\/\/doi.org\/10.1109\/ICCAIS48893.2020.9096742","DOI":"10.1109\/ICCAIS48893.2020.9096742"},{"key":"19_CR28","doi-asserted-by":"publisher","unstructured":"Alghamdi, W., Schukat, M.: Practical implementation of APTs on PTP time synchronisation networks. In: 31st Irish Signals and Systems Conference 2020, pp. 1\u20135. https:\/\/doi.org\/10.1109\/ISSC49989.2020.9180157","DOI":"10.1109\/ISSC49989.2020.9180157"},{"key":"19_CR29","doi-asserted-by":"publisher","unstructured":"Kim, T.H., Reeves, D.: A survey of domain name system vulnerabilities and attacks. J. Surveill Sec. Saf. 1, 34\u201360 (2020). https:\/\/doi.org\/10.20517\/jsss.2020.14","DOI":"10.20517\/jsss.2020.14"},{"key":"19_CR30","unstructured":"Stebila, D.: Attacks on TLS. https:\/\/www.douglas.stebila.ca\/research\/presentations\/tls-attacks\/"},{"key":"19_CR31","doi-asserted-by":"publisher","unstructured":"Berbecaru, D., Lioy, A.: On the robustness of applications based on the SSL and TLS security protocols. In: 4th European PKI Workshop: Theory and Practice (EuroPKI 2007), LNCS, vol. 4582, pp. 248\u2013264. Springer, Berlin (2007). https:\/\/doi.org\/10.1007\/978-3-540-73408-6_18","DOI":"10.1007\/978-3-540-73408-6_18"},{"key":"19_CR32","doi-asserted-by":"publisher","unstructured":"Berbecaru, D.: On Creating Digital Evidence in IP Networks With NetTrack. Handbook of Research on Network Forensics and Analysis Techniques, IGI Global (2018). https:\/\/doi.org\/10.4018\/978-1-5225-4100-4.ch012","DOI":"10.4018\/978-1-5225-4100-4.ch012"},{"key":"19_CR33","doi-asserted-by":"publisher","first-page":"126186","DOI":"10.1109\/ACCESS.2020.3007998","volume":"8","author":"DG Berbecaru","year":"2020","unstructured":"Berbecaru, D.G., Lioy, A., Cameroni, C.: Providing login and Wi-Fi access services with the eIDAS network: a practical approach. IEEE Access 8, 126186\u2013126200 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3007998","journal-title":"IEEE Access"},{"key":"19_CR34","doi-asserted-by":"publisher","first-page":"134096","DOI":"10.1109\/ACCESS.2021.3115853","volume":"9","author":"DG Berbecaru","year":"2021","unstructured":"Berbecaru, D.G., Lioy, A., Cameroni, C.: On enabling additional natural person and domain-specific attributes in the eIDAS network. IEEE Access 9, 134096\u2013134121 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3115853","journal-title":"IEEE Access"},{"key":"19_CR35","unstructured":"Kr\u00f6ner, U., Bergonzi, C., Fortuny-Guasch, J., Giuliani, R., Littmann, F., Shaw, D., Symeonidis, D.: Hardening of GNSS based trackers (2010). https:\/\/publications.jrc.ec.europa.eu\/repository\/bitstream\/JRC58733\/reqno_jrc58733_st_report_on_hardening_of_gnss_based_trackers_release_final.pdf"},{"key":"19_CR36","doi-asserted-by":"crossref","unstructured":"Piessens, F., Verbauwhede, I.: Software security: vulnerabilities and countermeasures for two attacker models. In: 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 990\u2013999","DOI":"10.3850\/9783981537079_0999"},{"key":"19_CR37","doi-asserted-by":"publisher","first-page":"1598","DOI":"10.3390\/s21051598","volume":"21","author":"SFJJ Ankerg\u00e5rd","year":"2021","unstructured":"Ankerg\u00e5rd, S.F.J.J., Dushku, E., Dragoni, N.: State-of-the-art software-based remote attestation: opportunities and open issues for internet of things. Sensors 21, 1598 (2021). https:\/\/doi.org\/10.3390\/s21051598","journal-title":"Sensors"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96627-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T15:04:52Z","timestamp":1675523092000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96627-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030966263","9783030966270"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96627-0_19","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/idc2021.unirc.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}