Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Table 1

Energy consumption in different security modes.

Security Mode Energy

No Security156 J
Encryption171 J
Authentication192 J
Encryption + Authentication207 J