Fig. 4From: Detection of wormhole attacks on IPv6 mobility-based wireless sensor networkAn example of wormhole attack in RPL networkBack to article page