Research Article

[Retracted] Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN

Figure 2

The overall attack scenario.
(a) Normal flow network
(b) Scenario of black hole attack and attacker intruded router
(c) Scenario of wormhole attack and attacker creates tunnel to listen the information