Fig. 8From: Detection of wormhole attacks on IPv6 mobility-based wireless sensor networkTopology of experiment 1 after wormhole attackBack to article page