Research Article
[Retracted] Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN
Figure 2
The overall attack scenario.
| (a) Normal flow network |
| (b) Scenario of black hole attack and attacker intruded router |
| (c) Scenario of wormhole attack and attacker creates tunnel to listen the information |