Fig. 4From: Precision time protocol attack strategies and their resistance to existing security extensionsImpact of BMCA or time source degradation attack on slavesBack to article page