Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Figure 7

Wormhole attack.