{"id":"https://openalex.org/W4416807785","doi":"https://doi.org/10.1186/s42400-025-00387-0","title":"Enhanced time-delay attack detection algorithm for precision time protocol","display_name":"Enhanced time-delay attack detection algorithm for precision time protocol","publication_year":2025,"publication_date":"2025-11-29","ids":{"openalex":"https://openalex.org/W4416807785","doi":"https://doi.org/10.1186/s42400-025-00387-0"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00387-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00387-0","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00387-0.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00387-0.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113128387","display_name":"Mohsen Moradi","orcid":null},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mohsen Moradi","raw_affiliation_strings":["Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024678473","display_name":"Amir Hossein Jahangir","orcid":"https://orcid.org/0000-0002-8837-0668"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Amir Hossein Jahangir","raw_affiliation_strings":["Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113128387"],"corresponding_institution_ids":["https://openalex.org/I133529467"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43254491,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.001500000013038516,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.7050999999046326},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6912999749183655},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.5978000164031982},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5514000058174133},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5142999887466431},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4223000109195709}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.760699987411499},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.7050999999046326},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6912999749183655},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.5978000164031982},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5514000058174133},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5142999887466431},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5120000243186951},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4747999906539917},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4223000109195709},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4147000014781952},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3937000036239624},{"id":"https://openalex.org/C2986737936","wikidata":"https://www.wikidata.org/wiki/Q1058791","display_name":"Time synchronization","level":2,"score":0.3822999894618988},{"id":"https://openalex.org/C129891060","wikidata":"https://www.wikidata.org/wiki/Q1513059","display_name":"Clock synchronization","level":4,"score":0.365200012922287},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33899998664855957},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2660999894142151},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2574999928474426},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2542000114917755}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00387-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00387-0","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00387-0.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9634a5d063f44d918443757c47f986db","is_oa":true,"landing_page_url":"https://doaj.org/article/9634a5d063f44d918443757c47f986db","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-28 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00387-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00387-0","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00387-0.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416807785.pdf"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1984828789","https://openalex.org/W1997095165","https://openalex.org/W2046266977","https://openalex.org/W2051307107","https://openalex.org/W2062003896","https://openalex.org/W2098158437","https://openalex.org/W2130677190","https://openalex.org/W2171629073","https://openalex.org/W2282232246","https://openalex.org/W2343733973","https://openalex.org/W2560332675","https://openalex.org/W2807443989","https://openalex.org/W2931304851","https://openalex.org/W3043113589","https://openalex.org/W3168380357","https://openalex.org/W3205028068","https://openalex.org/W3217064938","https://openalex.org/W4385834298","https://openalex.org/W4390655288","https://openalex.org/W4392197180","https://openalex.org/W4401508226"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Precision":[1],"Time":[2],"Protocol,":[3],"PTP,":[4],"is":[5,46],"one":[6],"of":[7,28,37,68,92,112,119,122,131],"the":[8,29,66,88,97,108,113,120,126,129],"most":[9],"accurate":[10],"protocols":[11],"for":[12],"maintaining":[13],"clock":[14],"synchronization":[15],"in":[16,70,117,125],"industrial":[17,71],"and":[18,21,64,81,90,105,110,128],"distributed":[19],"systems":[20],"networks.":[22,72],"Besides,":[23],"profiteering":[24],"or":[25],"malicious":[26],"intentions":[27],"network":[30,41,49,127],"attackers":[31],"have":[32],"led":[33],"to":[34,62],"various":[35],"types":[36],"cyber-attacks":[38],"on":[39,85],"different":[40],"parts.":[42],"Time-Delay":[43],"Attack,":[44],"TDA,":[45],"a":[47,57],"well-known":[48],"attack":[50],"that":[51,75],"disrupts":[52],"synchronization.":[53],"This":[54],"paper":[55],"studies":[56],"new":[58,78],"TDA":[59],"detection":[60],"algorithm":[61],"maintain":[63],"secure":[65],"benefits":[67],"PTP":[69,93],"We":[73],"show":[74],"through":[76],"adding":[77],"efficient":[79],"paths":[80],"innovative":[82],"computations":[83],"based":[84],"End-to-End":[86],"computing,":[87],"reliability":[89],"security":[91],"increase":[94],"significantly":[95],"while":[96],"incurred":[98],"traffic":[99],"overhead":[100],"remains":[101],"negligible.":[102],"Mathematical":[103],"analysis":[104],"simulations":[106],"confirm":[107],"effectiveness":[109],"advantages":[111],"proposed":[114],"algorithm,":[115],"especially":[116],"case":[118],"variety":[121],"attacks":[123],"detected":[124],"location":[130],"their":[132],"occurrence.":[133]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-11-29T00:00:00"}
