Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Figure 11

The comparison of synchronization error values under the different scenarios.