Bernd Hirschler

Learn More
Clock synchronization has become one of the enabling techniques to enable real-time on both application-and network level. One of the most promising and currently intensively discussed approaches is IEEE1588, a master slave based synchronization protocol, which is intended to be a protocol not only limited for one application use, but for many domains such(More)
This article analyzes the viability of secure tunneling for clock synchronization protocols with special respect to high-precision clock synchronization requiring hardware timestamping. It investigates whether security mechanisms introduced to protect timing information have an impact on the precision of clock synchronization. Two reference designs – one(More)
—Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter(More)
This paper presents the development of a novel joint safety and security architecture for dependable embedded time-triggered systems. While fault-tolerance properties of time-triggered protocols have been very well studied, research on security aspects for time-triggered systems have hardly been covered. Therefore, we explore system design principles which(More)
The Internet Protocol version 6 (IPv6) is expected to be one strong enabler for the smart grid. This article sets a focus on the secure transmission of IPv6 using Power Line Communication (PLC). The goal is to have a seamless, yet secure communication from the back office down to the field-level of the grid. This article analyzes how the Internet Protocol(More)
  • 1