Research Article

A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks

Figure 9

The scenario of the wormhole attack.