Secure Two-Way Fiber-Optic Time Transfer Against Sub-ns Asymmetric Delay Attack With Clock Model-Based Detection and Mitigation Scheme.
Yang LiJinlong HuYan PanWei HuangLi MaJie YangShuai ZhangYujie LuoChuang ZhouChenlin ZhangHeng WangYun ShaoYichen ZhangXing ChenZiyang ChenSong YuHong GuoBingjie XuPublished in: IEEE Trans. Instrum. Meas. (2023)
Keyphrases
- fiber optic
- authentication protocol
- authentication mechanism
- authentication scheme
- key agreement
- power distribution
- key distribution
- end to end delay
- telecommunication networks
- security analysis
- key management
- secret key
- provably secure
- laser beam
- neural network
- mobile nodes
- diffie hellman
- ad hoc networks
- high speed
- power consumption