|
State | Description (the information that the attacker obtains) |
|
State 1 | (1) None (initial healthy state) |
|
State 2 | (1) Configuration of both main clock node and slave node |
|
State 3 | (1) Real-time clock information of main clock node |
|
State 4 | (1) Real-time clock information of slave clock node |
|
State 5 | (1) Configuration of both main clock node and slave node |
(2) Real-time clock information of main clock node |
|
State 6 | (1) Configuration of both main clock node and slave node |
(2) Real-time clock information of slave clock node |
|
State 7 | (1) Real-time clock information of main clock node |
(2) Real-time clock information of slave clock node |
|
State 8 | (1) Configuration of both main clock node and slave node |
(2) Real-time clock information of main clock node |
(3) Real-time clock information of slave clock node |
|
State 9 | (1) Real-time clock information of main clock node |
(2) Real-time clock information of slave clock node |
(3) Attacker could change time without being detected |
|
State 10 | (1) Configuration of both main clock node and slave node |
(2) Real-time clock information of main clock node |
(3) Real-time clock information of slave clock node |
(4) Attack could change time without being detected |
|