Cyber-attack on packet-based time synchronization protocols: The undetectable Delay Box.
Sérgio BarretoAswin SureshJean-Yves Le BoudecPublished in: I2MTC (2016)
Keyphrases
- cyber attacks
- packet delivery
- loss probability
- medium access
- cyber security
- packet switching
- countermeasures
- routing algorithm
- ad hoc networks
- attack detection
- security policies
- intrusion detection system
- multicast tree
- wireless communication
- packet loss
- computer systems
- intrusion detection
- critical infrastructure
- routing protocol
- smart grid
- privacy issues
- dos attacks
- anomaly detection
- wireless sensor networks
- end to end
- security mechanisms
- data mining
- network topology