Fig. 6From: Detection of wormhole attacks on IPv6 mobility-based wireless sensor networkProcess of wormhole detection modelBack to article page