Figure 2From: A Secure Localization Approach against Wormhole Attacks Using Distance Consistency Flow chart of the proposed secure localization scheme. Back to article page