Secure two-way fiber-optic time transfer against sub-ns asymmetric delay
attack
- URL: http://arxiv.org/abs/2203.03803v1
- Date: Tue, 8 Mar 2022 01:55:59 GMT
- Title: Secure two-way fiber-optic time transfer against sub-ns asymmetric delay
attack
- Authors: Yang Li, Jinlong Hu, Li Ma, Wei Huang, Shuai Zhang, Yujie Luo, Chuang
Zhou, Chenlin Zhang, Heng Wang, Yan Pan, Yun Shao, Yichen Zhang, Xing Chen,
Ziyang Chen, Song Yu, Hong Guo, and Bingjie Xu
- Abstract summary: asymmetric delay attack is a serious threat which cannot be prevent by any encryption method.
Two-way fiber-optic time transfer system with time stability with 24.5ps, 3.98ps, and 2.95ps at 1s, 10s, and 100s averaging time is shown experimentally.
- Score: 20.00845773010957
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Two-way fiber-optic time transfer is a promising precise time synchronization
technique with sub-nanosecond accuracy. However, asymmetric delay attack is a
serious threat which cannot be prevent by any encryption method. In this paper,
a dynamic model based scheme is proposed to defense the sub-nanosecond
asymmetric delay attack. A threshold is set according to the estimated time
difference by a two-state clock model where the fixed frequency difference is
excluded from the time difference to detect the asymmetric delay attack which
is smaller than the time difference induced by the fixed frequency difference.
Theoretical simulation and experimental demonstration are implemented to prove
the feasibility of the scheme. A two-way fiber-optic time transfer system with
time stability with 24.5ps, 3.98ps, and 2.95ps at 1s, 10s, and 100s averaging
time is shown under sub-ns asymmetric time delay attack experimentally. The
proposed method provides a promising secure sub-ns precise time synchronization
technique against asymmetric delay attack.
Related papers
- Secure Combination of Untrusted Time information Based on Optimized Dempster-Shafer Theory [24.333157091055327]
Multiple paths scheme is thought as an effective security countermeasure to decrease the influence of Time Delay Attack (TDA)
In this paper, a secure combination algorithm based on Dempster-Shafer theory is proposed for multiple paths method.
Theoretical simulation shows that the proposed algorithm works much better than Fault Tolerant Algorithm (FTA) and the attack detection method based on single path.
arXiv Detail & Related papers (2024-06-19T13:15:12Z) - DASA: Delay-Adaptive Multi-Agent Stochastic Approximation [64.32538247395627]
We consider a setting in which $N$ agents aim to speedup a common Approximation problem by acting in parallel and communicating with a central server.
To mitigate the effect of delays and stragglers, we propose textttDASA, a Delay-Adaptive algorithm for multi-agent Approximation.
arXiv Detail & Related papers (2024-03-25T22:49:56Z) - Stochastic Approximation with Delayed Updates: Finite-Time Rates under Markovian Sampling [73.5602474095954]
We study the non-asymptotic performance of approximation schemes with delayed updates under Markovian sampling.
Our theoretical findings shed light on the finite-time effects of delays for a broad class of algorithms.
arXiv Detail & Related papers (2024-02-19T03:08:02Z) - PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis [1.765099515298011]
Precision Time Protocol (PTP) can accomplish high-precision time synchronization in trusted environments.
Time delay attacks pose the highest threat to the protocol, enabling attackers to diverge targeted clocks undetected.
This work proposes an approach to detect and counteract delay attacks against PTP based on cyclic path asymmetry measurements.
arXiv Detail & Related papers (2024-01-19T12:35:00Z) - Forecasting Particle Accelerator Interruptions Using Logistic LASSO
Regression [62.997667081978825]
Unforeseen particle accelerator interruptions, also known as interlocks, lead to abrupt operational changes despite being necessary safety measures.
We propose a simple yet powerful binary classification model aiming to forecast such interruptions.
The model is formulated as logistic regression penalized by at least absolute shrinkage and selection operator.
arXiv Detail & Related papers (2023-03-15T23:11:30Z) - Neural Laplace Control for Continuous-time Delayed Systems [76.81202657759222]
We propose a continuous-time model-based offline RL method that combines a Neural Laplace dynamics model with a model predictive control (MPC) planner.
We show experimentally on continuous-time delayed environments it is able to achieve near expert policy performance.
arXiv Detail & Related papers (2023-02-24T12:40:28Z) - Implementation of field two-way quantum synchronization of distant
clocks across a 7 km deployed fiber link [3.6570312017753084]
A field test of two-way quantum synchronization between a H-maser and a Rb clock linked by a 7 km-long deployed fiber was implemented.
The stability was improved by more than one-magnitude to 1.9 ps, even though the number of acquired photon pairs was only 1440 in 30 s.
arXiv Detail & Related papers (2021-09-02T08:48:51Z) - A Novel Approach for Classification and Forecasting of Time Series in
Particle Accelerators [52.77024349608834]
A novel time series classification approach is applied to decrease beam time loss in the High Intensity Proton Accelerator complex.
Our best performing interlock-to-stable classifier reaches an Area under the ROC Curve value of $0.71 pm 0.01$ compared to $0.65 pm 0.01$ of a Random Forest model.
arXiv Detail & Related papers (2021-02-01T11:53:14Z) - Stability and Identification of Random Asynchronous Linear
Time-Invariant Systems [81.02274958043883]
We show the additional benefits of randomization and asynchrony on the stability of linear dynamical systems.
For unknown randomized LTI systems, we propose a systematic identification method to recover the underlying dynamics.
arXiv Detail & Related papers (2020-12-08T02:00:04Z) - Secure and efficient synchronization scheme for quantum key distribution [2.8114538315299558]
We propose an alternative synchronization scheme by fixing the relative delay of the signal time window among all SPDs.
The new scheme is not only immune to the vulnerability but also improves the synchronization time from usually a few seconds to tens of milliseconds.
arXiv Detail & Related papers (2020-02-25T04:41:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.