Fig. 2From: Detection of wormhole attacks on IPv6 mobility-based wireless sensor networkAn example of wormhole attackBack to article page