Research Article

Protecting Clock Synchronization: Adversary Detection through Network Monitoring

Figure 12

Interarrival times of sync messages to the slave. Linearly increasing delay.