Fig. 3From: Detection of wormhole attacks on IPv6 mobility-based wireless sensor networkAn example of RPL network topologyBack to article page