Skip to main content
Fig. 5 | Cybersecurity

Fig. 5

From: Time sensitive networking security: issues of precision time protocol and its implementation

Fig. 5

Testbed design and usage for the Clock Disable Port Attack. Our modular framework allows to build a system with IaC technologies, which can be configured to include an arbitrary number of entities such as clocks, attackers, etc. connected according to different topologies. In black, entities that are not part of the time synchronization platform; in green, entities that are correctly and mutually synchronized; in red de-synchronized entities

Back to article page