Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Figure 7

Error-accumulation attack on multihop synchronization in TSCH. (a) In the nonmalicious setting. (b) Under the malicious setting.
(a)
(b)