Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Table 2

Comparison of different secure time synchronization protocols.

Secure ProtocolsSATS [12]SPS [8]NMTS [15]Our Proposed

Time SynchronizationATS
(Distributed Synchronization)
TPSN
(Centralized Synchronization)
MTS
(Distributed Synchronization)
TSCH
(Centralized Synchronization)

VulnerabilitiesReply Attack
Pulse-Delay Attack
Message Manipulation Attack
Forge/Modify Attack
Pulse-Delay Attack
Compromise Attack
Pulse-Delay Attack
Message Manipulation Attack
Reply Attack
Pulse-Delay Attack
Timeslot-template Attack
Error-accumulation Attack

CountermeasuresLogical Clock Checking
Hardware Clock Checking
Encryption
Authentication
TESLA
Maximum Consensus
Skew Estimation
Offset Compensation
Authentication
COF Algorithm
Improved TESLA
Multipath Approach

Energy CostHighMediumHighLow