Research Article
[Retracted] Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN
Figure 2
The overall attack scenario.
(a) Normal flow network |
(b) Scenario of black hole attack and attacker intruded router |
(c) Scenario of wormhole attack and attacker creates tunnel to listen the information |