{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T14:12:07Z","timestamp":1771251127939,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-026-05990-5","type":"journal-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T13:24:07Z","timestamp":1771248247000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing TTEthernet clock synchronization in the IIoT: A multilayered defense against intelligent cyber-attacks"],"prefix":"10.1007","volume":"29","author":[{"given":"Amin","family":"Karami","sequence":"first","affiliation":[]},{"given":"Mogos Anday","family":"Gebremedhin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,16]]},"reference":[{"key":"5990_CR1","unstructured":"Behrendt, A., De\u00a0Boer, E., Kasah, T., Koerber, B., Mohr, N., Richter, G.: Leveraging Industrial IoT and advanced technologies for digital transformation. McKinsey & Company. p. 1\u201375 (2021)"},{"key":"5990_CR2","unstructured":"Annavarapu, B.: 4 THE INDUSTRIAL INTERNET OF THINGS (IIOT): TRANSFORMING MANUFACTURING. PARADIGM SHIFT. p.\u00a026 (2024)"},{"key":"5990_CR3","unstructured":"Gebremedhin, MA.: Securing Clock Synchronization in TTEthernet-based IIoT [Prof Doc Thesis]. University of East London. Available from: https:\/\/repository.uel.ac.uk\/item\/8y5yy(2024)"},{"key":"5990_CR4","doi-asserted-by":"crossref","unstructured":"Kopetz, H., Ademaj, A., Grillinger, P., Steinhammer, K.: The time-triggered Ethernet (TTE) design. In: Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC\u201905). IEEE p. 22\u201333 (2005)","DOI":"10.1109\/ISORC.2005.56"},{"key":"5990_CR5","unstructured":"of\u00a0Automotive Engineers\u00a0(SAE) S. AS6802: Time-Triggered Ethernet. Society of Automotive Engineers (SAE). Accessed: 2025-05-23. Available from: https:\/\/www.sae.org\/standards\/content\/as6802\/ (2011)"},{"key":"5990_CR6","unstructured":"Hasan, M.M., Feng, H.: Performance Analysis for Deterministic System using Time Sensitive Network. arXiv preprint arXiv:2404.13639(2024)"},{"key":"5990_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3561032","author":"H Li","year":"2025","unstructured":"Li, H., Zhang, T., Zhu, K.: Dynamic Slot Extension Based High-Criticality Tasks Scheduling in TSN-Based DMCS. IEEE Internet of Things Journal (2025). https:\/\/doi.org\/10.1109\/JIOT.2025.3561032","journal-title":"IEEE Internet of Things Journal"},{"issue":"6","key":"5990_CR8","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/JPROC.2019.2913443","volume":"107","author":"S Vitturi","year":"2019","unstructured":"Vitturi, S., Zunino, C., Sauter, T.: Industrial communication systems and their future challenges: Next-generation Ethernet, IIoT, and 5G. Proc. IEEE 107(6), 944\u2013961 (2019)","journal-title":"Proc. IEEE"},{"key":"5990_CR9","doi-asserted-by":"crossref","unstructured":"Sari, A., Lekidis, A., Butun, I.: Industrial networks and IIoT: Now and future trends. Industrial IoT: Challenges, Design Principles, Applications, and Security. p. 3\u201355 (2020)","DOI":"10.1007\/978-3-030-42500-5_1"},{"issue":"76","key":"5990_CR10","doi-asserted-by":"publisher","first-page":"105","DOI":"10.21205\/deufmd.2024267613","volume":"26","author":"M Topsakal","year":"2024","unstructured":"Topsakal, M., Cevher, S.: Cyber Security for IEEE 802.1 Time Sensitive In-Vehicle Networking: Recent Advances and Impact Analysis of DoS Attacks. Deu Muhendislik Fakultesi Fen ve Muhendislik 26(76), 105\u2013118 (2024)","journal-title":"Deu Muhendislik Fakultesi Fen ve Muhendislik"},{"key":"5990_CR11","doi-asserted-by":"crossref","unstructured":"Kukkala, V.K., Bradley, T., Pasricha, S.: Security-Aware Design of Time-Critical Automotive Cyber-Physical Systems. In: Machine Learning and Optimization Techniques for Automotive Cyber-Physical Systems, pp. 121\u2013153. Springer (2023)","DOI":"10.1007\/978-3-031-28016-0_4"},{"key":"5990_CR12","doi-asserted-by":"crossref","unstructured":"Loveless, A.T.: On TTEthernet for integrated Fault-Tolerant spacecraft networks. In: AIAA SPACE 2015 Conference and Exposition. p. 4526 (2015)","DOI":"10.2514\/6.2015-4526"},{"key":"5990_CR13","unstructured":"Cragg, C.H., Graf, J.C., Hobbs, A.: Risk Reduction of Orion Multi-Purpose Crew Vehicle (MPCV) Program Government-Furnished Equipment for Environmental Control and Life Support (ECLS)(2021)"},{"key":"5990_CR14","unstructured":"Wikipedia contributors.: TTEthernet. Wikipedia. Last edited on July 13, 2024. Accessed on June 4. Available from: https:\/\/en.wikipedia.org\/wiki\/TTEthernet (2025)"},{"key":"5990_CR15","unstructured":"Ross, J.C., Schuster, D.M.: Orion Multi-Purpose Crew Vehicle (MPCV) Capsule Parachute Assembly System (CPAS) Wake Deficit Wind Tunnel Testing (2014)"},{"key":"5990_CR16","doi-asserted-by":"crossref","unstructured":"Finkenzeller, A., Butowski, O., Regnath, E., Hamad, M., Steinhorst, S.: PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis. In: IEEE INFOCOM 2024-IEEE Conference on Computer Communications. IEEE. p. 461\u2013470 (2024)","DOI":"10.1109\/INFOCOM52122.2024.10621345"},{"key":"5990_CR17","unstructured":"Time, B.: What are the challenges and solutions of time synchronisation for the IoT? Bodet Time. Accessed: 2025-05-23. https:\/\/www.bodet-time.com\/resources\/blog\/1895-what-are-the-challenges-and-solutions-of-time-synchronisation-for-the-iot.html"},{"issue":"6","key":"5990_CR18","doi-asserted-by":"publisher","DOI":"10.3390\/app13063923","volume":"13","author":"Y Weng","year":"2023","unstructured":"Weng, Y., Zhang, Y.: A survey of secure time synchronization. Applied Sciences 13(6), 3923 (2023)","journal-title":"Applied Sciences"},{"issue":"3","key":"5990_CR19","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1504\/IJCCBS.2013.058398","volume":"4","author":"W Steiner","year":"2013","unstructured":"Steiner, W., Dutertre, B.: The TTEthernet synchronisation protocols and their formal verification. International Journal of Critical Computer-Based Systems 17. 4(3), 280\u2013300 (2013)","journal-title":"International Journal of Critical Computer-Based Systems 17."},{"key":"5990_CR20","unstructured":"Ademaj, A.: Time-Triggered Ethernet \u2013 A Powerful Network Solution for Multiple Purpose. TTTech Computertechnik AG. Accessed: 2025-05-23. Available from: https:\/\/www.tttech.com\/sites\/default\/files\/documents\/TTEthernet_Technical-Whitepaper_TTTech.pdf (2024)"},{"issue":"10","key":"5990_CR21","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.17706\/jsw.11.10.1040-1053","volume":"11","author":"T Robati","year":"2016","unstructured":"Robati, T., El Kouhen, A., Gherbi, A., Mullins, J.: Time-triggered ethernet metamodel: Design and application. Journal of Software 11(10), 1040\u20131053 (2016)","journal-title":"Journal of Software"},{"key":"5990_CR22","doi-asserted-by":"crossref","unstructured":"Lund, M., Pezzarossa, L., Spars\u00f8, J., Time-predictable, S.M.A., TTEthenet Node. In: IEEE 22nd International Symposium on Real-Time Distributed Computing (ISORC). IEEE 2019, 229\u2013233 (2019)","DOI":"10.1109\/ISORC.2019.00048"},{"key":"5990_CR23","doi-asserted-by":"crossref","unstructured":"Dutertre, B., Shankar, N., Owre, S.: Integrated formal analysis of timed-triggered Ethernet (2012)","DOI":"10.1109\/DASC.2012.6383129"},{"issue":"07","key":"5990_CR24","doi-asserted-by":"publisher","first-page":"2050102","DOI":"10.1142\/S0218126620501029","volume":"29","author":"XQ Tang","year":"2020","unstructured":"Tang, X.Q., Li, Q., Lu, G., Xiong, H., He, F.: An Application-Level Method of Arbitrary Synchronization Failure Detection in TTEthernet Networks. Journal of Circuits, Systems and Computers. 29(07), 2050102 (2020)","journal-title":"Journal of Circuits, Systems and Computers."},{"issue":"1","key":"5990_CR25","first-page":"6297476","volume":"2016","author":"E Lisova","year":"2016","unstructured":"Lisova, E., Guti\u00e9rrez, M., Steiner, W., Uhlemann, E., \u00c5kerberg, J., Dobrin, R., et al.: Protecting clock synchronization: Adversary detection through network monitoring. Journal of Electrical and Computer Engineering. 2016(1), 6297476 (2016)","journal-title":"Journal of Electrical and Computer Engineering."},{"key":"5990_CR26","first-page":"134","volume":"2017","author":"E Lisova","year":"2017","unstructured":"Lisova, E., Uhlemann, E., \u00c5kerberg, J.: Monitoring of clock synchronization in cyber-physical systems: A sensitivity analysis. In: international conference on Internet of Things, embedded systems and communications (IINTEC). IEEE 2017, 134\u2013139 (2017)","journal-title":"IEEE"},{"issue":"9","key":"5990_CR27","doi-asserted-by":"publisher","first-page":"17057","DOI":"10.3934\/mbe.2023761","volume":"20","author":"ABC Douss","year":"2023","unstructured":"Douss, A.B.C., Abassi, R., Sauveron, D.: State-of-the-art survey of in-vehicle protocols and automotive Ethernet security and vulnerabilities. Mathematical Biosciences and Engineering 20(9), 17057\u201317095 (2023)","journal-title":"Mathematical Biosciences and Engineering"},{"key":"5990_CR28","unstructured":"Hagenlocher P. Performance of message authentication codes for secure ethernet. Network. 27 (2018)"},{"key":"5990_CR29","doi-asserted-by":"crossref","unstructured":"Perrig, A., Tygar, J.D., Perrig, A., Tygar, J.: TESLA broadcast authentication. In: Secure Broadcast Communication: In Wired and Wireless Networks, pp. 29\u201353. (2003)","DOI":"10.1007\/978-1-4615-0229-6_3"},{"key":"5990_CR30","doi-asserted-by":"crossref","unstructured":"Kgwadi, M., Kunz, T.: Securing RDS broadcast messages for smart grid applications. In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 1177\u20131181 (2010)","DOI":"10.1145\/1815396.1815666"},{"key":"5990_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/taes.2025.3552074","author":"J Anderson","year":"2025","unstructured":"Anderson, J., Lo, S., Walter, T.: Time Synchronization of TESLA-enabled GNSS Receivers. IEEE Transactions on Aerospace and Electronic Systems (2025). https:\/\/doi.org\/10.1109\/taes.2025.3552074","journal-title":"IEEE Transactions on Aerospace and Electronic Systems"},{"key":"5990_CR32","doi-asserted-by":"crossref","unstructured":"Pereira, J.C., Klenze, T., Giampietro, S., Limbeck, M., Spiliopoulos, D., Wolf, F.A., et\u00a0al.: Protocols to Code: Formal Verification of a Next-Generation Internet Router. arXiv preprint arXiv:2405.06074. (2024)","DOI":"10.1145\/3719027.3765104"},{"key":"5990_CR33","unstructured":"Finzi, A., Zhao, L.: Impact of as6802 synchronization protocol on time-triggered and rate-constrained traffic. In: 32nd Euromicro Conference on Real-Time Systems (ECRTS 2020). Schloss Dagstuhl\u2013Leibniz-Zentrum f\u00fcr Informatik. p. 17\u20131 (2020)"},{"key":"5990_CR34","doi-asserted-by":"crossref","unstructured":"Steiner, W., Dutertre, B.: Automated formal verification of the TTEthernet synchronization quality. In: NASA formal methods symposium. Springer. p. 375\u2013390 (2011)","DOI":"10.1007\/978-3-642-20398-5_27"},{"key":"5990_CR35","doi-asserted-by":"crossref","unstructured":"Steiner, W., Dutertre, B.: SMT-Based formal verification of a TTEthernet synchronization function. In: International Workshop on Formal Methods for Industrial Critical Systems. Springer. p. 148\u2013163 (2010)","DOI":"10.1007\/978-3-642-15898-8_10"},{"key":"5990_CR36","first-page":"1","volume":"2014","author":"G Martins","year":"2014","unstructured":"Martins, G., Bhattacharjee, A., Dubey, A., Koutsoukos, X.D.: Performance evaluation of an authentication mechanism in time-triggered networked control systems. In: 7th International Symposium on Resilient Control Systems (ISRCS). IEEE 2014, 1\u20136 (2014)","journal-title":"IEEE"},{"key":"5990_CR37","doi-asserted-by":"publisher","first-page":"85971","DOI":"10.1109\/ACCESS.2019.2926113","volume":"7","author":"R Zhao","year":"2019","unstructured":"Zhao, R., Qin, G., Lyu, Y., Yan, J.: Security-aware scheduling for TTEthernet-based real-time automotive systems. IEEE Access 7, 85971\u201385984 (2019)","journal-title":"IEEE Access"},{"key":"5990_CR38","doi-asserted-by":"crossref","unstructured":"Mathew, A., Kaur, S.: Predictive Maintenance for Manufacturing Using Data Mining Techniques. In: 2024 2nd World Conference on Communication & Computing (WCONF). IEEE. p. 1\u20135 (2024)","DOI":"10.1109\/WCONF61366.2024.10692226"},{"issue":"1","key":"5990_CR39","doi-asserted-by":"publisher","first-page":"50","DOI":"10.25299\/itjrd.2024.16852","volume":"9","author":"ZB Akhtar","year":"2024","unstructured":"Akhtar, Z.B., Rawol, A.T.: Enhancing cybersecurity through AI-powered security mechanisms. IT Journal Research and Development 9(1), 50\u201367 (2024)","journal-title":"IT Journal Research and Development"},{"key":"5990_CR40","doi-asserted-by":"crossref","unstructured":"Shit, R.C., Subudhi, S.: AI-Powered Anomaly Detection with Blockchain for Real-Time Security and Reliability in Autonomous Vehicles. arXiv preprint arXiv:2505.06632. (2025)","DOI":"10.1109\/SPACE65882.2025.11170917"},{"issue":"5","key":"5990_CR41","doi-asserted-by":"publisher","first-page":"1022","DOI":"10.23919\/cje.2021.00.419","volume":"32","author":"F He","year":"2023","unstructured":"He, F., Xiong, L., Zhou, X., Li, H., Xiong, H.: Scheduling Pattern of Time Triggered Ethernet Based on Reinforcement Learning. Chin. J. Electron. 32(5), 1022\u20131035 (2023)","journal-title":"Chin. J. Electron."},{"key":"5990_CR42","unstructured":"Chandekar, P., Mehta, M., Chandan, S.: Enhanced anomaly detection in iomt networks using ensemble ai models on the ciciomt2024 dataset. arXiv preprint arXiv:2502.11854. (2025)"},{"issue":"4","key":"5990_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-025-11108-x","volume":"58","author":"E Edozie","year":"2025","unstructured":"Edozie, E., Shuaibu, A.N., Sadiq, B.O., John, U.K.: Artificial intelligence advances in anomaly detection for telecom networks. Artificial Intelligence Review 58(4), 100 (2025)","journal-title":"Artificial Intelligence Review"},{"key":"5990_CR44","doi-asserted-by":"crossref","unstructured":"Zhou, L., Guo, H.: Anomaly detection methods for IIoT networks. In: 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI). IEEE. p. 214\u2013219 (2018)","DOI":"10.1109\/SOLI.2018.8476769"},{"key":"5990_CR45","unstructured":"Riper, H.V.: Taming the Machine: Putting Security at the Core of Generative AI. Tidal Cyber. Accessed: 2025-05-26. https:\/\/www.tidalcyber.com\/blog\/taming-the-machine-putting-security-at-the-core-of-generative-ai"},{"issue":"7","key":"5990_CR46","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.3390\/electronics9071090","volume":"9","author":"X Yang","year":"2020","unstructured":"Yang, X., Huang, Y., Shi, J., Cao, Z.: A performance analysis framework of time-triggered ethernet using real-time calculus. Electronics 9(7), 1090 (2020)","journal-title":"Electronics"},{"issue":"18","key":"5990_CR47","doi-asserted-by":"publisher","DOI":"10.3390\/app12189377","volume":"12","author":"SS Hameedi","year":"2022","unstructured":"Hameedi, S.S., Bayat, O.: Improving IoT data security and integrity using lightweight blockchain dynamic table. Applied Sciences 12(18), 9377 (2022)","journal-title":"Applied Sciences"},{"issue":"23","key":"5990_CR48","doi-asserted-by":"publisher","first-page":"4812","DOI":"10.3390\/electronics13234812","volume":"13","author":"H Tian","year":"2024","unstructured":"Tian, H., Huang, G.: Research on Distributed Secure Storage Framework of Industrial Internet of Things Data Based on Blockchain. Electronics 13(23), 4812 (2024)","journal-title":"Electronics"},{"key":"5990_CR49","unstructured":"Kapoor N.: IIoT Cybersecurity Explained. ISA Global Cybersecurity Alliance (ISAGCA). Accessed: 2025-05-26. https:\/\/gca.isa.org\/blog\/iiot-cybersecurity-explained"},{"key":"5990_CR50","unstructured":"DwyerOmega.: IIoT Systems Network Architecture for Monitoring. DwyerOmega. Accessed: 2025-05-26. https:\/\/www.dwyeromega.com\/en-us\/resources\/iiot-technical-architecture"},{"key":"5990_CR51","unstructured":"SentinelOne.: What is Cloud Security Monitoring? Benefits & Challenges. SentinelOne. Accessed: 2025-05-26. https:\/\/www.sentinelone.com\/cybersecurity-101\/cloud-security\/cloud-security-monitoring\/"},{"key":"5990_CR52","doi-asserted-by":"crossref","unstructured":"Calabrese, M., Curbo, J., Falco, G.: A Software Defined Networking Architecture for Time Triggered Ethernet in Space Systems. In: 2024 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE). p. 207\u2013212 (2024)","DOI":"10.1109\/WiSEE61249.2024.10850170"},{"key":"5990_CR53","unstructured":"Cogniteq.: Implementing Zero Trust Architecture in IoT Networks. Cogniteq. Accessed: 2025-05-26. https:\/\/www.cogniteq.com\/blog\/implementing-zero-trust-architecture-iot-networks"},{"key":"5990_CR54","unstructured":"Moffa, A.: Implementing Zero-Trust to IoT Solutions. PTC. Accessed: 2025-05-26. https:\/\/www.ptc.com\/en\/blogs\/iiot\/implementing-zero-trust-iot-solutions"},{"key":"5990_CR55","unstructured":"John P\u00a0Sahlin, PD.: Zero Trust and PQC Build a Stronger Security Foundation. General Dynamics Information Technology (GDIT). Accessed: 2025-05-26. https:\/\/www.gdit.com\/perspectives\/latest\/zero-trust-and-pqc-build-a-stronger-security-foundation\/"},{"key":"5990_CR56","unstructured":"O\u2019Donnell, O.: Protect End User Performance by Testing Post-Quantum Cryptography Connections at Scale. VIAVI Solutions. Accessed: 2025-05-26. https:\/\/blog.viavisolutions.com\/2025\/02\/03\/testing-post-quantum-cryptography-connections\/"},{"key":"5990_CR57","first-page":"1","volume":"2020","author":"M Kumar","year":"2020","unstructured":"Kumar, M., Pattnaik, P.: Post quantum cryptography (pqc)-an overview. In: IEEE High Performance Extreme Computing Conference (HPEC). IEEE 2020, 1\u20139 (2020)","journal-title":"IEEE"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05990-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05990-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05990-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T13:24:13Z","timestamp":1771248253000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05990-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,16]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5990"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05990-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,16]]},"assertion":[{"value":"21 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics declaration"}}],"article-number":"154"}}