Research Article
Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks
Algorithm 1
Secure pairwise time synchronization.
1: Node A sends a synchronization request to parent node B: | 2: ; | 3: Node B sends back an ACK message to A: | 4: , | ; | 5: Node A calculates: | 6: , ; | 7: if () | 8: ; | 9: else | 10: Filter out the synchronization packet, ; | 11: if () | 12: Blacklist(B), Send an alarm message to the Root; | 13: end |
|