Research Article

Protecting Clock Synchronization: Adversary Detection through Network Monitoring

Figure 3

The network topology used for the simulations.