Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Algorithm 1

Secure pairwise time synchronization.
1:  Node A sends a synchronization request to parent node B:
2:   ;
3:  Node B sends back an ACK message to A:
4:   ,
       ;
5:  Node A calculates:
6:   , ;
7:  if ()
8:   ;
9:  else
10:   Filter out the synchronization packet, ;
11:  if ()
12:   Blacklist(B), Send an alarm message to the Root;
13:  end