Research Article
Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks
Algorithm 1
Secure pairwise time synchronization.
| 1: Node A sends a synchronization request to parent node B: | | 2: ; | | 3: Node B sends back an ACK message to A: | | 4: , | | ; | | 5: Node A calculates: | | 6: , ; | | 7: if () | | 8: ; | | 9: else | | 10: Filter out the synchronization packet, ; | | 11: if () | | 12: Blacklist(B), Send an alarm message to the Root; | | 13: end |
|