Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Figure 12

The synchronization error and synchronization rate vary with time in malicious settings. (a) Original scheme. (b) Our proposed scheme.
(a)
(b)