Bernd Hirschler

Learn More
Clock synchronization has become one of the enabling techniques to enable real-time on both application-and network level. One of the most promising and currently intensively discussed approaches is IEEE1588, a master slave based synchronization protocol, which is intended to be a protocol not only limited for one application use, but for many domains such(More)
This article analyzes the viability of secure tunneling for clock synchronization protocols with special respect to high-precision clock synchronization requiring hardware timestamping. It investigates whether security mechanisms introduced to protect timing information have an impact on the precision of clock synchronization. Two reference designs – one(More)
This paper presents the development of a novel joint safety and security architecture for dependable embedded time-triggered systems. While fault-tolerance properties of time-triggered protocols have been very well studied, research on security aspects for time-triggered systems have hardly been covered. Therefore, we explore system design principles which(More)
—Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter(More)
  • 1