Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Figure 10

Test-bed implementation of time synchronization in TSCH networks.