{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T03:59:42Z","timestamp":1764388782954,"version":"3.46.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T00:00:00Z","timestamp":1764374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T00:00:00Z","timestamp":1764374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Precision Time Protocol, PTP, is one of the most accurate protocols for maintaining clock synchronization in industrial and distributed systems and networks. Besides, profiteering or malicious intentions of the network attackers have led to various types of cyber-attacks on different network parts. Time-Delay Attack, TDA, is a well-known network attack that disrupts synchronization. This paper studies a new TDA detection algorithm to maintain and secure the benefits of PTP in industrial networks. We show that through adding new efficient paths and innovative computations based on End-to-End computing, the reliability and security of PTP increase significantly while the incurred traffic overhead remains negligible. Mathematical analysis and simulations confirm the effectiveness and advantages of the proposed algorithm, especially in case of the variety of attacks detected in the network and the location of their occurrence.<\/jats:p>","DOI":"10.1186\/s42400-025-00387-0","type":"journal-article","created":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T03:01:42Z","timestamp":1764385302000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced time-delay attack detection algorithm for precision time protocol"],"prefix":"10.1186","volume":"8","author":[{"given":"Mohsen","family":"Moradi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8837-0668","authenticated-orcid":false,"given":"Amir Hossein","family":"Jahangir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,29]]},"reference":[{"issue":"12","key":"387_CR1","doi-asserted-by":"publisher","first-page":"100549","DOI":"10.1016\/j.segan.2021.100549","volume":"28","author":"PM Adhikari","year":"2021","unstructured":"Adhikari PM, Hooshyar H, Fitsik RJ, Vanfretti L (2021) (2021) Precision timing and communication networking experiments in a real-time power grid hardware-in-the-loop laboratory. Sustain Energy Grids Networks 28(12):100549","journal-title":"Sustain Energy Grids Networks"},{"issue":"12","key":"387_CR2","first-page":"1","volume":"4","author":"W Alghamdi","year":"2021","unstructured":"Alghamdi W, Schukat M (2021) Precision time protocol attack strategies and their resistance to existing security extensions. Cybersecurity 4(12):1\u201317","journal-title":"Cybersecurity"},{"key":"387_CR3","doi-asserted-by":"crossref","unstructured":"Allahi I, Idrees R, Khan, B, Masud S (2018) Performance evaluation of IEEE 1588 protocol with modified LibPTP in OMNet++. In: Annual IEEE International Systems Conference (SysCon), pp. 1\u20135","DOI":"10.1109\/SYSCON.2018.8369562"},{"key":"387_CR4","unstructured":"Annessi R, Fabini J, Iglesias F, Zseby T (2018) Encryption is Futile: Delay Attacks on High-Precision Clock Synchronization, arXiv preprint, arXiv:1811.08569"},{"issue":"1","key":"387_CR5","first-page":"18","volume":"16","author":"M Bassam","year":"2019","unstructured":"Bassam M, Marthe K, Rachid H, Mourad D, Chadi A (2019) An extension to the precision time protocol (PTP) to enable the detection of cyber attacks. IEEE Trans Industr Inf 16(1):18\u201327","journal-title":"IEEE Trans Industr Inf"},{"key":"387_CR6","volume-title":"Technical Report LERSSE-TR. Security Analysis of the Precise Time Protocol","author":"K Beznosov","year":"2006","unstructured":"Beznosov K, Tsang J (2006) Technical Report LERSSE-TR. Security Analysis of the Precise Time Protocol. University of British Columbia, Vancouver, Canada"},{"issue":"9","key":"387_CR7","doi-asserted-by":"publisher","first-page":"3070","DOI":"10.1109\/TIM.2011.2158159","volume":"60","author":"CM De Dominicis","year":"2011","unstructured":"De Dominicis CM, Ferrari P, Flammini A, Rinaldi S, Quarantelli M (2011) On the use of IEEE 1588 in existing IEC 61850-based SASs: current behavior and future challenges. IEEE Trans Instrum Meas 60(9):3070\u20133081","journal-title":"IEEE Trans Instrum Meas"},{"key":"387_CR8","doi-asserted-by":"crossref","unstructured":"Finkenzeller A, Butowski O, Regnath E, Hamad M Steinhorst S (2024) PTPsec: securing the precision time protocol against time delay attacks using cyclic path asymmetry analysis,\u201d arXiv preprint arXiv:2401.10664","DOI":"10.1109\/INFOCOM52122.2024.10621345"},{"key":"387_CR9","unstructured":"Galina S (2011) Standard profile for use of IEEE 1588 precision time protocol in power system applications, IEEEC37, pp. 238\u20132011"},{"key":"387_CR10","unstructured":"Garner G, Ryu H (2011) Synchronization of audio\/video bridging networks using IEEE 8021AS, Samsung advanced institute of technology, synchronization over ethernet and IP networks, IEEE Commun Mag"},{"issue":"4","key":"387_CR11","doi-asserted-by":"publisher","first-page":"2456","DOI":"10.1109\/COMST.2023.3305468","volume":"25","author":"J Gaspar","year":"2023","unstructured":"Gaspar J, Cruz T, Lam CT, Sim\u00f5es P (2023) Smart substation communications and cybersecurity: a comprehensive survey. IEEE Commun Surv Tutorials 25(4):2456\u20132493. https:\/\/doi.org\/10.1109\/COMST.2023.3305468","journal-title":"IEEE Commun Surv Tutorials"},{"key":"387_CR12","unstructured":"IEC, (2004) IEC (International Electrotechnical Commission) 61588, Precision clock synchronization protocol for networked measurement and control systems. In: IEEE International Standard, Institute of Electrical and Electronics Engineers"},{"key":"387_CR13","unstructured":"IEC TC57 (2010) IEC 61850: Communication networks and systems for power utility automation, International Electrotechnical Commission Standard"},{"key":"387_CR14","unstructured":"IEEE standard for a precision clock synchronization protocol for networked measurement and control systems. In: IEEE Standard 1588\u20132019 (Revision of IEEE Standard 1588\u20132008), Institute of Electrical and Electronics Engineers, Inc., IEEE Instrumentation and Measurement Society, New York, USA, 2020."},{"key":"387_CR15","doi-asserted-by":"crossref","unstructured":"Igorevich R., Park P (2016) A timed colored petri\u2010net modeling for precision time protocol. In: IEEE 2016 International Conference on Information Science and Communications Technologies (ICISCT), pp. 1\u20135","DOI":"10.1109\/ICISCT.2016.7777392"},{"key":"387_CR16","doi-asserted-by":"crossref","unstructured":"Kannan PG, Joshi R, Ch M. Chan, (2019) Precise time-synchronization in the data-plane using programmable switching ASICs, Proceedings of SOSR \u201819 (the 2019 ACM Symposium on SDN Research), San Jose, CA, USA","DOI":"10.1145\/3314148.3314353"},{"key":"387_CR17","doi-asserted-by":"crossref","unstructured":"Keten U (2021) GPS\/GNSS independent time transfer over telco IP core networks using DTM overlay. In: IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS)","DOI":"10.1109\/ISPCS49990.2021.9615348"},{"key":"387_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/6297476","volume":"2016","author":"E Lisova","year":"2016","unstructured":"Lisova E, Marina G, Wilfried S, Elisabeth U, Johan \u00c5, Radu D, Mats B (2016) Protecting clock synchronization: adversary detection through network monitoring. J Electric Comput Eng 2016:1\u201313","journal-title":"J Electric Comput Eng"},{"key":"387_CR19","doi-asserted-by":"crossref","unstructured":"Liu Y, Yang C (2011) OMNeT++ Based Modeling and Simulation of the IEEE 1588 PTP Clock. In; International Conference on Electrical and Control Engineering, pp. 4602\u20134605","DOI":"10.1109\/ICECENG.2011.6057471"},{"key":"387_CR20","unstructured":"Meinberg\u2019s NetSync Monitor, Ericsson (2018) Practical Implementations of Monitoring Phase in 5G eNodB,\u201d ITSF 2018"},{"key":"387_CR21","doi-asserted-by":"crossref","unstructured":"Mizrahi T (2011) Time synchronization security using IPsec and MACsec. In: IEEE International Symposium on Precision Clock Synchronization for Measurement Control and Communication. pp. 38\u201343","DOI":"10.1109\/ISPCS.2011.6070153"},{"key":"387_CR22","doi-asserted-by":"crossref","unstructured":"Mizrahi T (2012) A Game theoretic analysis of delay attacks against time synchronization protocols. In: IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings, pp. 1\u20136","DOI":"10.1109\/ISPCS.2012.6336612"},{"key":"387_CR23","doi-asserted-by":"crossref","unstructured":"Mizrahi T (2014) Security Requirements of time protocols in packet switched networks,\u201d (No. rfc7384)","DOI":"10.17487\/rfc7384"},{"key":"387_CR24","doi-asserted-by":"crossref","unstructured":"Moradi M, Jahangir AH (2024) A petri net model for time-delay attack detection in precision time protocol-based networks, IET Cyber\u2010Physical Systems: Theory & Applications, pp. 1\u201317","DOI":"10.1049\/cps2.12088"},{"key":"387_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107226","volume":"133","author":"M Moradi","year":"2021","unstructured":"Moradi M, Jahangir AH (2021) A new delay aattack detection algorithm for PTP network in power substation. Int J Electr Power Energy Syst 133:107226","journal-title":"Int J Electr Power Energy Syst"},{"key":"387_CR26","doi-asserted-by":"crossref","unstructured":"Moreira N, L\u00e1zaro J, Jimenez J, Idirin M, Astarloa A (2015) Security mechanisms to protect IEEE 1588 Synchronization: state of the art and trends. In: IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS), pp. 115\u2013120","DOI":"10.1109\/ISPCS.2015.7324694"},{"key":"387_CR27","doi-asserted-by":"crossref","unstructured":"Piffaretti DWM, dos Santos AFP, de Souza Dias GM et al., (2024) Cybersecurity analysis on precision time protocol, PREPRINT (Version 1) available at Research Square","DOI":"10.21203\/rs.3.rs-3798024\/v1"},{"key":"387_CR28","doi-asserted-by":"crossref","unstructured":"Treytl A, Hirschler B (2010) Securing IEEE 1588 by IPsec Tunnels-an Analysis. In: IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, pp. 83\u201390","DOI":"10.1109\/ISPCS.2010.5609765"},{"key":"387_CR29","doi-asserted-by":"crossref","unstructured":"Tsang J, Beznosov K, (2006) A security analysis of the precise time protocol (Short Paper), Int Conf Inform Commun Security","DOI":"10.1007\/11935308_4"},{"key":"387_CR30","doi-asserted-by":"crossref","unstructured":"Ullmann M, V\u00f6geler M (2009) Delay attacks\u2014Implication on NTP and PTP Time Synchronization. In: IEEE Int Symposium Precision Clock Synchronization for Measurement, Control and Communication, pp. 1\u20136","DOI":"10.1109\/ISPCS.2009.5340224"},{"key":"387_CR31","doi-asserted-by":"crossref","unstructured":"Xie J, Zheng L, Li G, Xie H, Sun X (2020) Simulation and analysis of time synchronization system for seafloor observatory network using OMNeT++. In: 12th International Conference on Communication Software and Networks (ICCSN), pp. 318\u2013323","DOI":"10.1109\/ICCSN49894.2020.9139076"},{"key":"387_CR32","unstructured":"Yang Q, An D, Yu W (2013) On Time Desynchronization Attack Against IEEE 1588 Protocol in Power Grid Systems. In: IEEE Energy tech, pp. 1\u20135"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00387-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00387-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00387-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T03:01:45Z","timestamp":1764385305000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-025-00387-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,29]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["387"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00387-0","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,29]]},"assertion":[{"value":"9 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"88"}}