Research Article
Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks
Figure 12
The synchronization error and synchronization rate vary with time in malicious settings. (a) Original scheme. (b) Our proposed scheme.
(a) |
(b) |