next up previous
Next: Implementation Issues Up: Initial Synchronization - Further Previous: Combining with multicast group

Dealing with clock drift.

Our authentication protocols assume that there is no clock drift between the sender and the receiver. In practice, however, the software clock can drift (e.g. under heavy load when the timer interrupt does not get serviced). Also, an attacker might be able to change the victim's time (e.g. by sending it spoofed NTP messages). A solution to these problems is that the receiver always consults its internal hardware clock, which has a small drift and which is hard for an attacker to disturb. Furthermore, the longer authentication chains in Scheme V tolerate an authentication delay on the order of tens of seconds, giving us a large security margin. It is reasonable to assume that the hardware clock does not drift tens of seconds within one session. Finally, the receiver can re-synchronize periodically, if the hardware clock appears to drift substantially.


next up previous
Next: Implementation Issues Up: Initial Synchronization - Further Previous: Combining with multicast group

Adrian Perrig
Sat Sep 2 17:01:14 PDT 2000