Research Article

LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System

Figure 6

Cross-layer attack at the protocol layer.