Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Figure 8

Diagram of multipath-based time synchronization.