Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Figure 4

A malicious node can easily forge broadcast time-synchronization packets.