Skip to main content
. 2018 Nov 13;18(11):3907. doi: 10.3390/s18113907

Figure 9.

Figure 9

Two methods of wormhole attack; (a) using radio channel; (b) using wired channel.