Research Article
Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks
Table 2
Comparison of different secure time synchronization protocols.
| Secure Protocols | SATS [12] | SPS [8] | NMTS [15] | Our Proposed |
| Time Synchronization | ATS (Distributed Synchronization) | TPSN (Centralized Synchronization) | MTS (Distributed Synchronization) | TSCH (Centralized Synchronization) |
| Vulnerabilities | Reply Attack Pulse-Delay Attack Message Manipulation Attack | Forge/Modify Attack Pulse-Delay Attack Compromise Attack | Pulse-Delay Attack Message Manipulation Attack | Reply Attack Pulse-Delay Attack Timeslot-template Attack Error-accumulation Attack |
| Countermeasures | Logical Clock Checking Hardware Clock Checking | Encryption Authentication TESLA | Maximum Consensus Skew Estimation Offset Compensation | Authentication COF Algorithm Improved TESLA Multipath Approach |
| Energy Cost | High | Medium | High | Low |
|
|