Research Article

Protecting Clock Synchronization: Adversary Detection through Network Monitoring

Figure 7

Clock synchronization protocol under attack.