Fig. 8From: Time sensitive networking security: issues of precision time protocol and its implementationWhen the attacker is elected as the master, the other clocks in the system are completely controllable. This graph shows a running query of the internal clock of a victim, compared with the internal clock value of a previously synchronized external observerBack to article page