Slave Clock Responses to Precision Time Protocol Attacks: A Case Study.
Waleed AlghamdiMichael SchukatPublished in: Cyber Security (2020)
Keyphrases
- cryptographic protocols
- security protocols
- denial of service attacks
- secure routing
- cryptographic algorithms
- master slave
- precision and recall
- high speed
- countermeasures
- lightweight
- case study
- high precision
- authentication protocol
- power consumption
- dos attacks
- malicious attacks
- security threats
- routing protocol
- ddos attacks
- communication protocol
- security mechanisms
- information security
- end hosts
- attack scenarios
- sensor networks
- security risks
- test bed
- tcp ip
- watermarking algorithm
- security issues
- key management