Download Now Free registration required
In this paper, the authors present fundamental results on secure clock synchronization and man-in-the-middle detection using only timing information. Under the assumption of affine clocks, they present a clock synchronization protocol that can operate on any channel on which data can be sent. They present a clock synchronization protocol from the literature and add verification steps on top of this protocol. These verification steps force man-in-the-middle attackers, who want to delay traffic between the endpoints and yet remain undetected, to impose only constant delays on packets.
- Format: PDF
- Size: 231.8 KB