![Malicious route construction attacks on source routing: carousel attack | Download Scientific Diagram Malicious route construction attacks on source routing: carousel attack | Download Scientific Diagram](https://www.researchgate.net/profile/Dwaipayan-Giri/publication/260603051/figure/fig1/AS:296768102256640@1447766437241/Malicious-route-construction-attacks-on-source-routing-carousel-attack_Q320.jpg)
Malicious route construction attacks on source routing: carousel attack | Download Scientific Diagram
Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues
![Malicious route construction attacks on source routing: stretch attack | Download Scientific Diagram Malicious route construction attacks on source routing: stretch attack | Download Scientific Diagram](https://www.researchgate.net/profile/Dwaipayan-Giri/publication/260603051/figure/fig2/AS:296768102256642@1447766437288/Malicious-route-construction-attacks-on-source-routing-stretch-attack.png)
Malicious route construction attacks on source routing: stretch attack | Download Scientific Diagram
![Malicious route construction attacks on source routing: carousel attack | Download Scientific Diagram Malicious route construction attacks on source routing: carousel attack | Download Scientific Diagram](https://www.researchgate.net/profile/Dwaipayan-Giri/publication/260603051/figure/fig1/AS:296768102256640@1447766437241/Malicious-route-construction-attacks-on-source-routing-carousel-attack.png)