Research Article
Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks
Table 1
Energy consumption in different security modes.
| | Security Mode | Energy |
| | No Security | 156 J | | Encryption | 171 J | | Authentication | 192 J | | Encryption + Authentication | 207 J |
|
|