Research Article

Protecting Clock Synchronization: Adversary Detection through Network Monitoring

Figure 10

Interarrival times of sync messages to the slave. Constant delay, μs.