Fig. 6From: Precision time protocol attack strategies and their resistance to existing security extensionsImpact of asymmetric packet delay manipulation attackBack to article page