Fig. 7From: Detection of wormhole attacks on IPv6 mobility-based wireless sensor networkTopology of experiment 1 before wormhole attackBack to article page