A Review of Research on Secure Time Synchronization Technology of Precision Time Protocol
DOI:
https://doi.org/10.54097/r4c00h88Keywords:
IEEE 1588, PTP, time synchronization security, multicast authentication, key management, anti-quantum cipherAbstract
Precision Time Protocol (PTP) is the core implementation of the IEEE 1588 standard and is widely used in areas such as power, industrial Internet, financial transactions and communications that require extremely high time synchronization accuracy. However, with the deployment of PTP in an open network environment, the security mechanism it lacked at the beginning of its design gradually exposed serious vulnerabilities and became an important target for attackers. In recent years, the security research on PTP has been deepened, covering multiple directions such as attack classification, protection methods, key management mechanism, protocol optimization and standard updates. This article is based on more than 40 relevant research literatures at home and abroad in the past decade, and conducts a systematic review of PTP security issues. First, the threat types under different attack models are summarized, including delayed attacks, replay attacks, message tampering, spoofing and denial of service, etc.; then, existing protection measures are sorted out, from the message authentication code (MAC) scheme of IEEE 1588 Appendix K, to multicast authentication mechanisms such as TESLA, IPsec/MACsec-based link encryption, hardware trusted nodes, blockchain and quantum cryptographic enhancement schemes, etc.; then, various key management and distribution strategies are analyzed, including NTS4PTP, centralized and distributed key exchange, post-quantum key negotiation and other technologies. The review shows that the focus of future PTP security research will focus on four directions: lightweight, high security authentication, low-latency key update, anti-quantum attack mechanism, and cross-layer comprehensive protection, so as to provide end-to-end verifiable security guarantees while ensuring nanosecond synchronization accuracy.
Downloads
References
[1] "IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems," in IEEE Std 1588-2002 vol., no., pp.1-154, 31 Oct. 2002.
[2] "IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems," in IEEE Std 1588-2008 (Revision of IEEE Std 1588-2002), vol., no., pp.1-269, 24 July 2008.
[3] B. Hirschler and A. Treytl, "Validation and verification of IEEE 1588 Annex K," 2011 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, Munich, Germany, 2011, pp. 44-49.
[4] C. Önal and H. Kirrmann, "Security improvements for IEEE 1588 Annex K: Implementation and comparison of authentication codes," 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings, San Francisco, CA, USA, 2012, pp. 1-6.
[5] Institute of Electrical and Electronics Engineers - IEEE Standards Association, "IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems", IEEE Standard 1588-2019, 2019.
[6] Chang Siqi, Chu Yingjun. Features and applications of Precision Time Synchronization Protocol IEEE 1588-2019 version [J]. Communications and Information Technology, 2022, (S2): 10-13.
[7] Zhang Meng, Lu Bo. Research on quantum enhanced secure time synchronization protocol [J]. Optical Communication Research, 2021, (04): 21-25+49.
[8] Wang Zhaowei. Research on high-precision, high-safe time synchronization method for industrial wireless sensor networks [D]. University of Chinese Academy of Sciences, 2018.
[9] Zhang Ying, Shen Xi, Li Qihao, et al. Smart substation protocol delay attack detection and recovery model based on Markov logic tree and system brittleness analysis [J]. Power System Protection and Control, 2020, 48(03):113-121.
[10] Alghamdi W, Schukat M. A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node. Sensors (Basel). 2022 May 11;22(10):3671.
[11] Shanghai Electric Group Co., Ltd. A device that realizes the synchronization of the secure clock of the industrial Internet of Things and its function implementation method [P]. 2021-12-17.
[12] E. Itkin and A. Wool, “A Security Analysis and Revised Security Extension for the Precision Time Protocol,” IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 1, pp. 22–34, 2020.
[13] Z. Idrees, S. Latif, H. Tahir, and L. Zheng, “Enhancing IEEE 1588 PTP security for IIoT networks: A lightweight attack detection and mitigation framework,” Internet of Things, vol. 33, p. 101669, 2025.
[14] P. Ciotirnae and A. F. Păun, “Increasing the Robustness of the Time Reference Distribution Equipments using Multimodal Security Methods Based on Blockchain Implementations,” in Proc. 2024 IEEE 15th International Conference on Communications (COMM), 2024.
[15] M. Langer and R. Bermbach, “NTS4PTP—Key Management System for the Precision Time Protocol Based on the Network Time Security Protocol,” Internet-Draft (draft-langer-ntp-nts4ptp-02), IETF/Network Time Protocol WG, Work in Progress, Aug. 20, 2021.
[16] F. Rezabek, M. Helm, T. Leonhardt, and G. Carle, “PTP Security Measures and their Impact on Synchronization Accuracy,” in Proc. IFIP/IEEE International Conference on Network and Service Management (CNSM), 2022.
[17] Kemparaj, P.; Kumar, S. S. Secure precision time protocol in packet switched networks. In: 2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS), Portland, OR, USA, Sept. 2019, pp. 1–6.
[18] T. Mizrahi, “Security Requirements of Time Protocols in Packet Switched Networks,” RFC 7384, Oct. 2014.
[19] M. Treytl and B. Hirschler, “Securing IEEE 1588 by IPsec tunnels—An analysis,” in Proc. 2010 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication (ISPCS), 2010.
[20] N. Moreira, A. Astarloa, U. Kretzschmar, J. Lázaro, and E. Molina, “Securing IEEE 1588 messages with message authentication codes based on the KECCAK cryptographic algorithm implemented in FPGAs,” in Proc. IEEE Int. Symp. on Precision Clock Synchronization for Measurement, Control and Communication (ISPCS), 2014.
[21] M. Sharkhawy, “Attack Detection and Mitigation for High-Precision Clock Synchronization: The Precision Time Protocol (PTP) Case Study,” Diploma thesis, Faculty of Informatics, TU Wien, Vienna, Austria, May 18, 2021.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Journal of Computer Science and Artificial Intelligence

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.








