Research Article

Protecting Clock Synchronization: Adversary Detection through Network Monitoring

Figure 2

Clock synchronization protocol.