Blog
According to Gartner, 45% of companies worldwide will have suffered a cyberattack by 2025. Nowadays, a cyberattack occurs every 39 seconds. In this context where cyberattacks are on the rise and even more complex, logging of information systems turns out to be a central solution for cybersecurity. Logging enables to be responsive to security incidents but also to be prepared and prevent them from happening.
Time synchronisation is paramount in the Internet of Things (IoT). In industrial IoT for example, accurate synchronisation can prevent production errors by ensuring that sensors and machines work together.
In security applications such as the supervision of critical infrastructures, time synchronisation allows for precise correlation of events recorded by different devices (time clocking terminals, security cameras), centralised in a master server.
To synchronise clocks across a local area network (LAN), it is necessary to measure the transmission delay caused by network’s technical and usage factors.
When a machine receives a message with a timestamp from a master clock, a delay is introduced due to the distance to this clock. Indeed, if a message travels along one metre of optical fibre, or crosses several different data centres, the transmission time may vary and introduce a variable delay. As a result, it is better to know this latency to synchronise a clock correctly.
There are many protocols available to synchronise clocks within a network infrastructure. The most widely used are NTP and SNTP, but when the highest possible level of accuracy is required, the PTP protocol (Precision Time Protocol) is chosen.
PTP has been introduced in 2002 via the IEEE 1588 standard which has known many evolutions since (the last version of the standard dates back to 2019).
One of PTP’s most important algorithmic building blocks is the BMCA (Best Master Clock Algorithm). BMCA enables to determine which clock, among those available on the network, will provide the time reference for the entire infrastructure.
Network Time Security (NTS) is a protocol which has been developed for securing communications between clients and time servers of the NTP protocol (Network Time Protocol).
NTP is an old protocol which has been developed at a time where security was less of a concern as today. As it was much criticized these last few years for its lack of security which made it vulnerable to several types of attacks (man-in-the-middle, spoofing, replay), NTS decided to add authentication and encryption layers to NTP exchanges, thus protecting them from these attacks.
The economic figures for the transport sector following the covid crisis have been available for a few months now, and what we can say is that the transport sector has bounced back well, both in France and internationally.
In order to establish synchronisation mechanisms within a local network, the first thing to do is choosing the right protocol. Indeed, many protocols are available for synchronising equipment within a network (PTP, NTP, SNTP, and so on). The first answer would be using the NTP protocol.
Time synchronisation is a necessity in many areas of computing and networking, especially in critical systems where accuracy, reliability and security are paramount and depend on maintaining time consistency between all the objects involved.
It is because all machines of a complex system will be synchronised that the system will be able to coordinate actions, ensure the consistency of transactions and maintain data integrity, even though it is made up of distributed systems.
Nowadays, there are many sectors for which each microsecond counts. It is actually the case for the defence, aerospace and the energy sector. As for the application of these sectors, IRIG (Inter-Range Instrumentation Group) is the most widely used time standard. Indeed, it offers reliability and accuracy to complex logistics operations. It also ensures measurement correction in critical telemetry systems.