Secure Combination of Untrusted Time Information Based on Optimized Dempster-Shafer Theory

Secure precision time synchronization is important for applications of cyber-physical systems (CPSs). However, several attacks, especially the time delay attack (TDA), deteriorate the performance of the time synchronization system seriously. The multiple paths scheme is thought as an effective secur...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on instrumentation and measurement Vol. 74; pp. 1 - 9
Main Authors Li, Yang, Luo, Yujie, Fang, Lujun, Zhang, Yichen, Huang, Wei, Sun, Ao, Zhang, Shuai, Zhang, Tao, Zhou, Chuang, Ma, Li, Yang, Jie, Wang, Heng, Pan, Yan, Shao, Yun, Chen, Xing, Chen, Ziyang, Yu, Song, Luo, Bin, Guo, Hong, Xu, Bingjie
Format Journal Article
LanguageEnglish
Published New York IEEE 2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN0018-9456
1557-9662
1557-9662
DOI10.1109/TIM.2025.3565381

Cover

More Information
Summary:Secure precision time synchronization is important for applications of cyber-physical systems (CPSs). However, several attacks, especially the time delay attack (TDA), deteriorate the performance of the time synchronization system seriously. The multiple paths scheme is thought as an effective security countermeasure to decrease the influence of TDA. However, the effective secure combination algorithm is still missed for precision time synchronization. In this article, a secure combination algorithm based on the Dempster-Shafer (D-S) theory is proposed for the multiple paths method. Special optimizations are done for the combination algorithm to solve the potential problems due to untrusted evidence. Theoretical simulation shows that the proposed algorithm works much better than the fault-tolerant algorithm (FTA) and the attack detection method based on a single path. An experimental demonstration proves the feasibility and superiority of the proposed algorithm, where the time stability with 27.97, 1.57, and 1.12 ps at average time 1, 10, and 100 s is achieved under TDAs and local clock jumps. The proposed algorithm can be used to improve the security and resilience of many important synchronization protocols, such as network time protocol (NTP), precision time protocol (PTP), and two-way fiber-optic time transfer (TWFTT).
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0018-9456
1557-9662
1557-9662
DOI:10.1109/TIM.2025.3565381