Figure 1From: An effective implementation of security based algorithmic approach in mobile adhoc networks Wormhole attack. Back to article page