Bodet-Time

Blog

What are the challenges and solutions of time synchronisation for the IoT?

Time synchronisation is paramount in the Internet of Things (IoT). In industrial IoT for example, accurate synchronisation can prevent production errors by ensuring that sensors and machines work together.

In security applications such as the supervision of critical infrastructures, time synchronisation allows for precise correlation of events recorded by different devices (time clocking terminals, security cameras), centralised in a master server.

Comment fonctionne la correction de la latence dans PTP ?

To synchronise clocks across a local area network (LAN), it is necessary to measure the transmission delay caused by network’s technical and usage factors.

When a machine receives a message with a timestamp from a master clock, a delay is introduced due to the distance to this clock. Indeed, if a message travels along one metre of optical fibre, or crosses several different data centres, the transmission time may vary and introduce a variable delay. As a result, it is better to know this latency to synchronise a clock correctly.

Qu’est-ce que l’algorithme BMCA dans PTP ?

There are many protocols available to synchronise clocks within a network infrastructure. The most widely used are NTP and SNTP, but when the highest possible level of accuracy is required, the PTP protocol (Precision Time Protocol) is chosen.

PTP has been introduced in 2002 via the IEEE 1588 standard which has known many evolutions since (the last version of the standard dates back to 2019).

One of PTP’s most important algorithmic building blocks is the BMCA (Best Master Clock Algorithm). BMCA enables to determine which clock, among those available on the network, will provide the time reference for the entire infrastructure.

What is Network Time Security (NTS)?

Network Time Security (NTS) is a protocol which has been developed for securing communications between clients and time servers of the NTP protocol (Network Time Protocol).

NTP is an old protocol which has been developed at a time where security was less of a concern as today. As it was much criticized these last few years for its lack of security which made it vulnerable to several types of attacks (man-in-the-middle, spoofing, replay), NTS decided to add authentication and encryption layers to NTP exchanges, thus protecting them from these attacks.

The issues of a cyberattack in the transport sector

The economic figures for the transport sector following the covid crisis have been available for a few months now, and what we can say is that the transport sector has bounced back well, both in France and internationally.

STRATUMS IN THE NTP PROTOCOL: Understanding the hierarchy of servers

In order to establish synchronisation mechanisms within a local network, the first thing to do is choosing the right protocol. Indeed, many protocols are available for synchronising equipment within a network (PTP, NTP, SNTP, and so on). The first answer would be using the NTP protocol.

Comparing synchronisation protocols: IRIG vs. NTP vs. PTP

Time synchronisation is a necessity in many areas of computing and networking, especially in critical systems where accuracy, reliability and security are paramount and depend on maintaining time consistency between all the objects involved.

It is because all machines of a complex system will be synchronised that the system will be able to coordinate actions, ensure the consistency of transactions and maintain data integrity, even though it is made up of distributed systems.

Overview of the IRIG time standard

Nowadays, there are many sectors for which each microsecond counts. It is actually the case for the defence, aerospace and the energy sector. As for the application of these sectors, IRIG (Inter-Range Instrumentation Group) is the most widely used time standard. Indeed, it offers reliability and accuracy to complex logistics operations. It also ensures measurement correction in critical telemetry systems.

How to enhance the security of a video surveillance system?

Video surveillance is an important factor when it comes to security. Whether as visual evidence or a deterrent, video surveillance systems enhance the security of goods and people. What is to be done when the video surveillance system itself is subject to security breaches? Indeed, surveillance cameras are often subject to attacks, from location and image retrieval to manipulation of video data, particularly timestamping. As a result, implementing a reliable time source is essential to secure all video protection systems.