Fig. 1From: Detection of wormhole attacks on IPv6 mobility-based wireless sensor networkAn example of wireless sensor network topologyBack to article page