next up previous
Next: The TESLA Broadcast Authentication Up: Background and Assumptions Previous: One-Way Chains

Time Synchronization

 

TESLA does not need the strong time synchronization properties that sophisticated time synchronization protocols provide [22, 24, 37], but only requires loose time synchronization, and that the receiver knows an upper bound on the sender's local time. We now outline a simple and secure time synchronization protocol that achieves this requirement. For simplicity, we assume the clock drift of both sender and receiver is negligible (otherwise the receiver can periodically resynchronize the time with the sender). We denote the real difference between the sender and the receiver's time with δ. In loose time synchronization, the receiver does not need to know the exact δ but only an upper bound on it, Δ, which we also refer to as the maximum time synchronization error. We now describe a simple protocol for time synchronization, where each receiver performs explicit time synchronization with the sender. This approach does not require any extra infrastructure to perform time synchronization. We present a simple two-round time synchronization protocol that satisfies the requirement for TESLA, which is that the receiver knows an upper bound on the sender's clock. Reiter previously describes this protocol [31, 32].

  figure304
Figure 2: Direct time synchronization between the sender and the receiver. The receiver issues a time synchronization request at time tR, at which time the sender's clock is at time t1. The sender responds to the request at its local time tS. In TESLA, the receiver is only interested in an upper bound on the sender's time. When the receiver has its current time tr, it computes the upper bound on the current sender's time as ts ≤tr - tR + tS. The real synchronization error after this protocol is δ. The receiver, however, does not know the propagation delay of the time synchronization request packet, so it must assume that the time synchronization error is Δ (or the full round-trip time (RTT)).

Figure 2 shows a sample time synchronization between the receiver and the sender. In the protocol, the receiver first records its local time tR and sends a time synchronization request containing a nonce to the sender.gif Upon receiving the time synchronization request, the sender records its local time tS and replies with a signed response packet containing tS and the nonce.gif

  1. Setup. The sender S has a digital signature key pair, with the private key KS-1 and the public key KS. We assume a mechanism that allows a receiver R to learn the authenticated public key KS. The receiver chooses a random and unpredictable nonce.
  2. Protocol steps. Before sending the first message, the receiver records its local time tR.
    align334
    To verify the return message, the receiver verifies the digital signature and checks that the nonce in the packet equals the nonce it randomly generated. If the message is authentic, the receiver stores tR and tS. To compute the upper bound on the sender's clock at local time t, the receiver computes t-tR+tS.

Upon receiving the signed response, the receiver checks the validity of the signature and verifies that the nonce in the response packet equals the nonce in the request packet. If all verifications are successful, the receiver uses tR and tS to compute the upper bound of the sender's time: when the receiver has the current time tr, it computes the upper bound on the current sender's time as ts ≤tr - tR + tS. The real synchronization error after this protocol is δ, as Figure 2 shows. The receiver, however, does not know the propagation delay of the time synchronization request packet, so it must assume that the time synchronization error is Δ (or the full round-trip time (RTT)).

A digital signature operation is computationally expensive, and we need to be careful about denial-of-service attacks in which an attacker floods the sender with time synchronization requests. Another problem is request implosion: the sender is overwhelmed with time synchronization requests from receivers. We address these issues in our earlier paper [27].


next up previous
Next: The TESLA Broadcast Authentication Up: Background and Assumptions Previous: One-Way Chains

Adrian Perrig
Mon Aug 5 22:55:55 PDT 2002