Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Figure 2

Two methods in device-to-device synchronization. (a) Frame-based synchronization. (b) Acknowledgment-based synchronization.
(a)
(b)