Research Article
Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks
Table 1
Energy consumption in different security modes.
| Security Mode | Energy |
| No Security | 156 J | Encryption | 171 J | Authentication | 192 J | Encryption + Authentication | 207 J |
|
|