Introduction

At first, the concept of Coordinated Universal Time, (UTC), was formulated during 1960s as a means of enhancing the distribution of Universal Time, and to provide the balanced rate of atomic standards in a time signal. The UTC concept has been in practice for more than three decades, and appeared as a rational. Though, the necessities for time keeping have emerged from the classification of UTC. The requirement of a standardized time scale, without the interruption established by the leap seconds, a one-second adjustment, is increasing. UTC makes available the base of civil time, which is related with the legal time of the majority countries. Arias and Guinot [1] stated that local realizations of UTC in time laboratories across the world ensure the diffusion of a time scale which denotes UTC at the intensity of some tens of nanoseconds.

Time zone in India is calculated by GMT/UTC (Greenwich mean time/Coordinated universal time) + 5.5 h. It is also known as IST (Indian Standard Time). Time zone in India is measured based on 82.5° E of longitude at Shankargarh Fort in Mirzapur that is considered as Indian central meridian. Time for daylight saving does not function in India. India is huge nation. It stretches at widest point for 2933 km from east of Arunachal Pradesh to west of Gujarat and covers approximately longitude of 30°. Based on convention, every time zone in globe is spaced by longitude of 15°. Thus, two time zones are there for India. Therefore, government decides to have single time zone around the entire nation like China, in spite of different proposals and requests to modify it. This indicates that rises and sets of sun approximately two hours soon on Eastern border of India than in west side of Rann of Kutch [2].

The people, policymakers and capitalists from northeast part of India have been insisting for a separate time zone for a long period of time since they really go through problems with the current IST. The current IST method is considered as a factor that negatively influencing their lives since the sun rises and sets at an earlier time than the so-called official working period. Early sunrise results in loss of daylight hours by the time workplace or academic organizations open. During winter, this issue gets even worse as they witness sunset much early. BIPM has a convenient time scale, referred to as International Atomic Time (TAI), for a consistent sequential reference of time. TAI is a standardized and very balanced scale, however does not keep in pace with the asymmetrical rotation of the Earth. Consequently [3], for public and convenient uses, UTC comes to practice, which is similar with TAI, apart from time to time a leap seconds are included to make sure that, while averaged over a year, the sun traverses through the Greenwich meridian at midday UTC to within 0.9 s.

Globally, many laws, policies and systems, public expectations and technologies necessitate that communal timekeeping stick to Universal Time. The use of two similar systems, UTC and Stepped Atomic Time (SAT), was considered as a stage in the evolution and implementation of a single, convenient and globally acceptable system. The resultant UTC time-scale relay globally, with its potential “jumps” in time, started to cause interests amongst users that looked for stable time scales. There was a growing demand for accurate frequencies for practical uses. Ahuja [4] pointed out that UTC was suggested as the base of standard time in almost all nations, the time in common practice as dispersed by radio signals.

The more conventional function of primary frequency standards (PFS) intensifies the accuracy level of UTC and sets off a new practical advancement for time-scale algorithms. The growth of time and frequency metrology functions in the various metrology zones strengthens the measures of the BIPM time department to enhance the accuracy of UTC, wherein the management with the Regional Metrology Organizations (RMOs) has an important role. The algorithm for the estimation of UTC has been developed to assure the reliability, long-standing frequency stability, increased frequency accuracy level and ease of access of the time-scale. It depends on clock readings and is increasingly reliant on the superiority of the clock comparisons. Panfilo and Arias [5] specified that the BIPM, in a corresponding strength with the world timing society, is devoted to developing and enhancing these techniques.

Lokhorst [6] mentioned that same moment in time could be represented in numerous ways. Every representation could store one or more different information pieces. If the information is more, then extensively adopt Date Time unit. For instance, time is represented in unique way in opening ceremony during start of winter Olympics in 2014 in Sochi, Russia and it is illustrated in Table 1.

Table 1 Time and date and its information

Above representations deal with same moment in time and at the same time, they are different in quantity of information given. A local time and date along with UTC offset could be changed to UTC time and date but not vice versa Tables 2, 3, 4.

Table 2 Time synchronization
Table 3 Security issues in time synchronization
Table 4 Existing studies

Synchronization of time is distributing reference of time to real-time clocks in the network of telecommunication. All linked nodes have right to acquire information about time or during every reference period in timing signal is noted and dated as well as distribute a timescale commonly and associated epoch (inside the related requirement for time accuracy). Timescales examples are TAI, UTC, GPS, PTP, UTC + offset (for example local time) and local arbitrary time. Distributing synchronization of time is one way to achieve synchronization phase [7].

Due to unfixed modes in communication and multifaceted interconnection between physical components and layer of cyber information, channels for communication are at risk to malicious attacks which would increase security problems in cyber public system. There are different attacks in CPS like availability attacks [8,9,10], integrity attacks, such as replay attack [11], deception attack on the basis on innovation [12] false-data injection [13, 14]. GPS (global positioning system) signal is extremely free, stable and accurate for timing, measuring devices based on GPS are implemented in main infrastructures for guaranteeing the synchronization of time between subsystems and therefore reach desirable performance. At the same time, malicious agents would affect the synchronization of time among sensors by implementing counterfeit signals of GPS [15]. Few prior researchers [16,17,18,19] and real-world attacks in GPS spoofing have indicated the GPS signals’ vulnerability and probability of spoofing the receivers in GPS [20]. According to Wang [21], any successful synchronization of time attack that inserts virtual offsets on sensor clocks and at the same time target system is desynchronized would result in huge degradation in performance.

Objectives of the research are as follows:

  1. (i)

    To investigate the need for developing framework for national time dissemination

  2. (ii)

    To study about security issues faced with UTC (k)

  3. (iii)

    To develop and design a cyber physical secure framework for national time dissemination

  4. (iv)

    To examine about performance of cyber physical secure framework in cyber-secure environment.

There are numerous studies that focused on time synchronization, such as Agarwal et al. [22], Marangos et al. [23], Khediri et al. [24], Schneider [25]. Authors also focused on security issues in time synchronization [8, 16, 19, 26,27,28,29,30]. Fault-tolerant synchronization of clock studied by Kikuya et al. [31], event-based distributed synchronization of clock was investigated by [32]. Simulations of CPS like CPS co-simulator framework were studied by [33]. However, there are no specific studies focused on designing and developing cyber physical secure framework for national time dissemination. Therefore, this particular research intends to focus designing and developing cyber physical secure framework for national time dissemination. Performance of developed framework achieves traceability and synchronization.

Literature Review

Time Synchronization: An Overview

According to Agarwal et al. [22], the protector or developer of primary time-scale generating IST is CSIR-National Physical Laboratory (CSIR-NPL), New Delhi. The current paper reports the primary reduction of the improbability of Primary Time-Scale from 20 to 7.2 ns and ultimately to 2.8 ns. The paper also discusses present time distribution techniques being used and the activities undertaken for advancement and amplification of the primary time-scale to contribute to the country in a better way at the same level with the global level. The purpose of advancement is to meet the national requirements of e-governance, digital archiving, cyber security, enhanced communication systems, internet of things, etc. To conclude, this article explained the tasks undertaken to improve the primary time-scale and its distribution capabilities to users like Indian Space Research Organization (ISRO).

As any typical forensic investigation gives rise to the law court, the study has also dealt with the existing position of the related legislation, bearing in mind that the study intends to examine technical audience. The time synchronization is of major significance as well for the investigation logs to be employed as basis of evidence. A necessity that clearly is not simple to accomplish, particularly in a cloud context wherein the cloud server and the client are generally to be found in various time zones: not only physical localities can be in different geographical regions and accordingly distinctive time zones but as well virtualized services might be familiarized to the time zones of their web patrons [23].

Khediri et al [24] expressed that synchronization is essential aspect of successful and effective operations in every business settings as they depend on the data accuracy level to make fast and effective decisions. In general, the proposed techniques necessitate that all sensor nodes have a collective time scale in order that the central unit could synchronize and coordinate between sensors to achieve their tasks. Yet, it is complicated to maintain a common time-scale for all sensors. Acceptability of evidence could be forced with technological proofs. These days, contemporary cryptography provides the tools for incontestable clock management. Any variation of time, several application of time synchronization procedure could become non-repudiation employing public key cryptographic systems. Though, these techniques are not supported by the current time synchronization applications.

As reported by the report of Schneider [25], time synchronization signals are transmitted at regular intervals periodically over the network, every meter constantly evaluates its capability to remain coordinated with the external broadcasts. Time synchronization allows to harmonize the internal clocks of every complex PowerLogic™ ION™ devices. Once harmonized, every data log has time stamps which are corresponding to a standardized time base, which empowers to accomplish accurate series of events and power quality assessment.

Security Issues in Time Synchronization

Yang et al. [29] studied about security vulnerabilities in time synchronization, with regard to Time-slotted channel hopping (TSCH). Time synchronization is extremely essential for the TSCH-based wireless networks. Though, the time-synchronization behavior in TSCH networks focuses on only clock accuracy whilst paying no attention to security issues. If an opposition initiates time-synchronization damage on a network, the whole network communication system would possibly be paralyzed. There are various secure time-synchronization etiquettes in WSNs (for example SPS and SMTS). In the current study, time synchronization in networks is classified into single-hop, cluster-wise, and multi-hop in line with the network scope. The study analyzes their security attacks, because of the high-precision synchronization conditions and finds out some particular attacks and later presents related security countermeasures. The study dealt with Dolev-Yao threat model, which is a standard attack model wherein the attacker could eavesdrop, change, or falsifies communication messages in the system. The two kinds of attack considered in the study are external and internal. In the external attack, a third party could eavesdrop on or change messages but could not find the secret key. Consequently, it is not able to copy a legitimate node, whereas an internal attacker could obtain legal characteristics since it identifies the secret key.

Zhang et al. [16, 19] studied the impact of time synchronization. Fault detection and event location assessment are generally based on accurate timing information. In the current study, a new Time Synchronization Attack (TSA) is developed to deal with the timing information. As many applications use synchronous measurements and the majority of the measurement appliances are provided with global positioning system (GPS) for accurate timing, it is increasingly likely to harm the measurement system by bluffing the GPS. The efficiency of TSA is established for three applications of device known as phasor measurement unit (PMU) in smart grid, i.e. communication line fault identification, voltage stability monitoring and event location. The strength of TSA is exhibited by arithmetical simulations.

As stated by Lisova [8, 28] in current society, increasingly more embedded systems are connecting. There are various kinds of embedded systems, such as industrial networks, connected vehicles, etc. Generally, such cyber physical systems (CPS), irrespective of their information, have a communication part which empowers data exchange amid system and external entities. In this paper, a threat and vulnerability analysis of time synchronization is created upon IEEE 1588, a standard extensively employed in sector for instituting and maintaining clock synchronization. Safety and security interface is as well considered to observe which implications the developed security system has on the safety realm. After all, the monitoring technique is summarized and assessed for various estimations of channel consistency to examine the pertinence of the solution in various settings, and consequently a method for black-channel state manager model is given.

Yadav and Yadav [30] specified that time synchronization is a fundamental specification for different applications. In every synchronization attack, the objective is to influence nodes in some way that their adjacent nodes are at a several time then they actually are. As global synchronization is the aim for certain protocols and they depend on the adjacent nodes to transmit the synchronization data on, negotiating a node would interrupt the international synchronization. The lately proposed maximum and minimum time synchronization protocol (MMTS) is a potential alternate model since it does not base on some network topology. However, MMTS is exposed to various message manipulation attacks. The study focuses on how to protect the MMTS protocol in WSNs under message exploitation attacks. In addition, the study investigates the effect of message exploitation attacks over MMTS. Followed by, a novel Secured SMMTS protocol is developed to find and disprove message manipulation attacks.

Study by Guo et al. [27] take time synchronization attack into account against multi-system scheduling wherein numerous sensors examine various linear dynamical methods and plan their transmissions through a communal rear-ender channel. The study exhibits that by arbitrarily inserting relative time balances on the sensors, the spiteful attacker is capable of making the anticipated estimation error covariance of the entire system differs without certain system knowledge. For the circumstances that the third party has complete system information, the study proposes an effective algorithm to compute the optimal attack, which takes off the least amount of sensors and results in uncontrolled average estimation fault covariance. To moderate the attack outcome, the study further proposes a counteraction by developing shift invariant communication policies and classifies the lower and upper boundaries for system assessment performance. To conclude, simulation examples are presented to demonstrate the acquired results.

Barreto [26] presents a study about cyber-attack on packet-based time synchronization protocols (PBTSP) with increased-accuracy specifications. The cyber-attack is untraceable from the PBTSP’s views and manipulates a vulnerability which is in the nature of every PBTSP. It could be effectively performed irrespective of the cryptographic behavior that the PBTSP is defended with and it is untraceable by the algorithm known as clock-servo within the target slave clock. To execute this cyber-attack, the study builds a “Delay Box” able to advance or delay a slave clock by establishing a spiteful offset of a few microseconds. The paper runs experimental analysis to the delay box to demonstrate the extent of the attack and to authorize imperceptibility. In conclusion, the study discusses potential countermeasures for this kind of attack.

Existing Studies

For all protocols based on packet synchronization, main problem is to avoid end-to-end delays in asymmetric. Such delays happen because of processing delays, transmission and queuing. For solve this main issue, transparent clocks were initiated in PTP standard that estimates the queuing delays, processing and routing for correcting asymmetric delays. Further classified into configuration, hardware- and software-based techniques, configuration and software-based approaches with the help of PTP standard at reasonable cost as no new equipment of hardware is needed and could give performance in microsecond synchronization. At the same time for highly precise performance in synchronization, support of hardware is needed for precise timestamping and residence times. In addition to that, security is main challenge to safeguard the timing messages against illegal attackers disrupt services as well as leads to failure and damage to equipment [34].

Kyriakakis et al. [35] studied engineering issues in communication of time-triggered (TT) and distribution scheduling of task over Ethernet switch. Synthetic application of CPS is deployed and estimated the experimental set-up design that involves three nodes: 2 actuation nodes which control 2 servo motors and 1 time server. Messages of TT were switched from server node to client that control duty cycle of two signals of pulse width modulation. Even though authors evaluated and explained experimental scheme of TT communication and collect 1st outcomes on negative impacts of non-cooperative traffic in the flows of TT, more investigation is required to measure the miss rate at client node and achieving synchronization of time [36], quality relying on the injected traffic in the network. At the same time, authors planned to combine the proposed CPS test into network of time-sensitive networking and was done based on research [37]. Authors repeated the experiment within a time-triggered Ethernet network and wound up with set of hardware and software components for node of end-system required to attain time-triggered communication in real-time networks in Ethernet.

Authors also presented a framework to perform exact numerical simulations of CPS, namely CPS co-simulator [33]. Researchers also studied about event-based distributed synchronization of clock for fixed sensor networks [32]. Kikuya et al. [31] focused on fault-tolerant synchronization of clock over unreliable channels in networks of fixed sensor.

Technical Gaps

Information assets, such as data and information systems, should be confined from security threats. There are even some gaps existed and these are considered very representative of current complications and challenges in Cyber Security Framework. In consequence, it is essential to upgrade existing standards and develop a new process, such as cyber risk management, to deal with the various gaps. Security issues and challenges in the UTC system have become a major issue across the world, and accordingly developing secure and efficient CPS is considered extremely essential. In consequence, this study makes an attempt to bridge this gap. The study also stands unique by developing a framework for national time dissemination in cyber-secure environment.

Research Methodology

Main intention of the research is to design and develop cyber security framework for national time dissemination. Qualitative research is kind of investigation in science. It searches answers to research question, gathers evidence and so on. It is efficient in getting culturally particular data about social contexts, behaviours, values and opinions of specific inhabitants [38]. This research adopts qualitative research for designing and developing cyber security framework for national time dissemination. An experimental design of the research is about blueprint of methods engaged in answering the question of the research. It is completed plan to carry out the scientific investigation. Investigators visualize a design of the research for any examination not merely on basis of notion or convenience. There are different criteria and methods for classifying research design, namely experimental and non-experimental design. Experimental design encompasses adopt of some form of intervention or experiment [39]. This research makes use of experimental design for carrying out the investigation. For experimental research, data are collected from National Physical Laboratory and National measurement institute of India. Software used in this particular research for implementing the framework is archimate open source Fig. 1.

Fig. 1
figure 1

Overall representation of research methodology

Proposed System

Figure 2 illustrates CPS framework: identity, analyze and address. Identify framework of CPS, these are the regions of utilization of CPS wherein stakeholders might have cross-domain concerns. Identify cross-cutting concerns are another important aspect, such as social, business and technological, etc. Shareholders could have concerns which intersect or are examples of wider conceptual concerns. It also addresses concerns by means of various activities and artifacts systematized within three basic components of conceptualization, realization, and assurance. Aspects of CPS are functional, lifecycle, data, business, composition, human, timing, boundaries and trustworthiness. Facets of CPS are realization, assurance and conceptualization. CPS includes components, such as digital, analog and human, originated for functions through unified physics and logic. CPS and associated systems are broadly identified as having increased potential to facilitate inventive applications and influence various economic sectors in the global economy. These application domains include infrastructures, building control, healthcare, etc. The CPS Framework in any domain presents an organized management of a CPS method on the basis of its core concepts of domains, facets and aspects [40]. CPS as well includes conventional operational technology (OT) in order for controlling aspects and catalyst. As stated by Griffor et al. [41, 42], the combination of information and traditional technology worlds along with related timing limitations is a specifically new feature of CPS. A CPS function can be a System of Systems (SoS) [43]. Per se, it might link manifold purposes, and also time and data domains, therefore necessitating methods of translation amongst these domains. For instance, different time domains might refer different timescales or have typical accuracies.

Fig. 2
figure 2

Overview and derivation of CPS framework

Figure 3 represents time scale system UTC 9k)–CSIR NPL time scale system (IST). In the domain of time and frequency altitude, the preferred reference is generally UTC, or one or more than that of its authorized realizations, known as UTC (k), and traceability to UTC is an authorized condition for many entities. Traceability to UTC could be formulated in three areas including frequency, time interval, and time-of-day synchronization. Time signals, integrating those diffused by GPS satellites and system time servers, could be used to institute legal metrological traceability to UTC all through a UTC (k) timescale. These signs have small adequate uncertainties to address industrial synchronization and traceability necessities, but users are accountable for having adequate evidence to show that their necessities are being addressed. Matsakis et al. [44] pointed out that an important part of this signal is the capability to exhibit that an uninterrupted sequence of calibrations back to UTC through a UTC (k) laboratory subsists, and that every linkage of the traceability chain has a standard measurement uncertainty.

Fig. 3
figure 3

TIME Scale System UTC (k)–CSIR NPL Timescale system (IST)

Figure 4 illustrates about timescale management system. It explains about timescale system UTC (k) system cyber-secure physical framework for UTC–NPLI. Timescale management system is categorized into subsystem. Clock ensemble comes under subsystem 1. Measurement system comes under subsystem 2. Satellite receivers come under subsystem 3. Facility management system comes under subsystem 4. Central processing system comes under subsystem 5. Component Monitor and Control System comes under subsystem 6. Timescale distribution system comes under subsystem 7.

Fig. 4
figure 4

Timescale management system

Clock Ensemble (General): Subsytem1

A local recognition of UTC (k) is seen as main reference in the system of national time dissemination. Design of UTC (k) adopts a collection of 3 active hydrogen masters for offering redundancy and monitoring the performance of maser in real time. Clock ensemble encompasses PMS (phase micro-steppers) for guiding the phase and timescale frequency without distributing masers themselves. PMS are chosen for low added noise in phase without affecting ensemble performance. Once ensemble of time is fully calibrated and operational, only frequency guides to PMS to track UTC closely. For every few years, hydrogen masers must be re-tuned or else they would move too away from the output frequency in the design. Timing uncertainty given by clock system must be considerably below the other uncertainty sources, so that it does not influence overall sensitivity of timing in the system of primary timescale.

UTC (NPLI) Clock Ensemble

Presently, in set-up of state-of-the-art timescales, known as primary timescales, are expanded using five caesium clocks, measurement system, one hydrogen maser and links for international satellite for comparison of clock and link of traceability. Caesium clocks give complete atomic time reference that has outstanding long-term stability, while hydrogen maser has final stability in short-term. UTC (NPLI) is recognized as guided output of AHM (active hydrogen maser). Ensemble of timescale has five Caesium clocks with high performance.

Measurement system: Subsystem 2

Using the measurement system and calibration of frequency and time, it is probable for calibrating Rb standards of atomic frequency, Cs atomic clocks, signal generators, counters, standards of quartz frequency, spectrum analyzers, chronometers, tachometers and timers. Measurement capabilities and calibration of the system are needed for uncertainty of frequency measurement, frequency range, measurement of time interval, measurement uncertainty of time interval, uncertainty of amplitude measurement, amplitude range, measurement of modulation parameter, measurement of phase noise. Recognition of international traceability of UTC (k) primary time scale to BIPM encompasses signal analysis capabilities and measurements of phase noise. For ensuring that stamping of time in received signals are traced to local standard of time, a full end-to-end calibration in chain of time distribution is required to every node in system.

Satellite Signals: Subsystem-3

Global navigation satellite system (GNSS) satellites system giving autonomous geo-spatial positioning and recovery of frequency or time with global coverage, permitting receivers to identify their attitude, time, longitude and latitude using signals of time transmitted by radio to receive line-of-sight from satellites. Present GNSS entails the European Union’s Galileo, China’s Beidou systems, United States’ GPS, Russia’s GLONASS.

GNSS Receiver: It is adopted for receiving signals from GNSS are compared against the timescale of UTC (k). BIPM could adopt such measurements for computing timescale of UTC (k) time offset. There are different techniques there for processing of data. Most commonly adopted is PPP (Precise point positioning) that is regularly used by BIPM.

Facility Management System: Subsystem 4

Systems in timescale implemented sites encompassing sites in disaster recovery required to be conditioned with precision AC system on basis of 24/7. Absolute rooms’ temperature must be kept within 20 ± 2 °C. Room must be conditioned with dual UPS (uninterrupted power supply) on basis of 24/7. Supplies of power must be controlled and made accessible through STS (static transfers witch). Monitoring console is there in the workstation room to monitor and characterize the system of timescale. Earth pits are there for earthing for equipment of timescale and atomic clocks. Needed earth strips are there within the room. Further lighting arrestors on top of the roof are ensured. Internal temperature and fans of the equipment are monitored for detecting failures at initial stage and for informing a pro-active strategy for replacement if necessary.

Central Processing System (CPS): Subsystem 5

CPS gives control interfaces in top level and coordinates more loosely coupled services and lower levels workflow. CPS gathers data regarding health service and universal operational status using data is divided between controllers of master that is accountable for maintaining and starting services and controller for processing which handling processing execution and less scheduling. CPS would harmonize difficult performance within system of timescale and other system parts. Main drivers of CPS modules are consistency and accessibility. CPS modules are performed in such a way that functionality in controlling is allocated among processing block controller, processing controller and master controller. Allocated control assures the requirement of reliability and availability are meant by CPS.

Component Monitor and Control System (CMCS): Subsystem6

Tiered approach was deployed in CMCS of UTC (k). Primary timescale involves a many components on the basis of commitment where CMCS would carry out. Every stage in component controls, monitors and manages all other UTC (k) elements through control and monitor systems, local to every component which in-turn stage-control, monitor and manage respective elements. Apart from these, local system gets commands from such system to control that are interpreted into commands at low level by local systems as well as transmit to component equipment. CMCS components collect monitoring information from each of equipment in component and transmit it up to CMCS.

Timescale distribution system (TDS): Subsystem 7

TDS would give timing information using NTP from system of primary timescale. Networks have suitable and sufficient security against external threats. No failure would be seen in the system of time dissemination. Such system would supply for at least clients/sec for NTP. Such system has to support minimum 20 point to point offered links for serving priority clients. Every system could have minimum two fixed internet IP focused on distributed to assure high availability.

Discussion

India will possibly have two time zones. Though, the Government of India prefers to keep a single time zone across the entire nation, regardless of a number of requests and suggestions to change it. The state Government of Assam aims to introduce the single time zone across the entire state and rest of the other northeast part of Indian states [45]. Ahuja et al. [4] discussed the benefits of advancing IST in terms of energy-saving. However, the Government of India is keen to keep one time zone to inhibit confusion and security issues. National Meteorology Institute (NMI) transmits their clock data to BIPM and latter estimates the actual international time scale (TAI) on the basis of these data. For instance, in the United States, legitimate time is categorized into nine standard time zones together with DST [3].

Cyber-physical systems (CPS) as an advanced system include engineered interrelating networks of physical and computational components. CPS can interrelate with humans by means of several new modalities. It is generally considered as having great prospective to facilitate innovative applications and influence various economic divisions in the global economy. As CPSs interact with their environs, synchronized requirements and relevance are of fundamental nature, since there are time limits to be acquainted with system responses [46]. The proposed CPS framework in the study presents a set of advanced concepts, in which their goal is to present a common language for defining interoperable CPS architectures in different domains. The three facets of CPS include conceptualization, realization, and assurance is presented in detail. Each facet is exhibited and understood from its set of artifacts. As discussed in the paper, security, reliability in addition to safety, against spiteful and also natural attacks and conditions, could be figured out as one of the important challenges in CPS design [47]. With more CPSs interconnecting to the surrounding network, the threat to impairment that caused deliberately is greater than ever. Consequently, as stated by Schneider [48], there is a demand to synchronize safety and reliability engineering such that the difficult risk of harm as a result of either faulty or spiteful intention is sufficiently addressed.

Conclusion

Time is the primary metadata which deal with a log-record. Though, the complicated problem of timekeeping in conventional systems becomes almost a burden for logging system designers, and regrettably, the problem of time synchronization and traceability has been underrated from the research community. The study particularly carried out to design and develops a novel system for cyber security framework in the context of national time dissemination. CPS is extensively identified as having great potential to authorize inventive applications and influence multiple sectors in the global economy. The developed framework in the study will be revolutionary and invasive. Examining the challenges and prospects of CPS involves broad accord in foundational conceptions, and a collective understanding of the critical new potentials and technological systems unique to CPS. A knowledge gap still subsists with regard to establishing the science of cyber security for UTC. In this context, in other technological fields, a systematic technique is typically proposed and applied to deal with these demands. The advantage of such a science is the growth and analysis of theories which result in comprehending the wide removal of cyber threats and the capability to analyze trade-offs in supporting network missions whilst reducing attacks.

The advancement of UTC has adhered to the scientific and industrial growth by formulating appropriate paradigms, more modified calculation algorithms, more effective and fast distribution processes and a well-defined traceability chain. Main aim of the study is to make primary time scale system as CPS framework. Currently, UTC (k) system is followed in India and the Timescale System controlled and monitored as individual subsystems. The availability and fault management of subsystems contributes to the overall robustness and dependability of Timescale system that has significant amount of subsystems that are bound to have malfunctioning of equipment, hardware, software and also exposed to its cyber and Physical risks. Thus, it is significant to have Primary Timescale System UTC(k) in CPS and then enhanced integrated management of PTS should lean to CPS and Time Dissemination used as primary source for national time, then it would achieve resilient and stabilized traceability and synchronization including cybersecurity, privacy, trust including block-chain, distributed archives digital characteristics, trusted and adaptive security architecture, co-engineered safety and security, Such upgraded system is referred as consolidated PTS. For achieving traceability and synchronization, this research had developed framework for national time dissemination in a cyber-secure environment.

Future Scope

The study carried out in a way to address the larger question of retaining mission functionality of a system in cyber-attacks. The study comes to the conclusion that CPS application systems should be designed and developed by considering the progressive technologies, essential system-level requirements, and inclusive effect on the real world. The study has provided an outline of some of the more significant challenges and techniques linked with timing issues in developing and designing CPS framework. Additional studies on design setting which facilitates better specification and authentication of timing requirements are required and also more work in dealing with security issues in time synchronization.