Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Figure 5

TESLA broadcast-authentication mechanism.