Figure 2From: An effective implementation of security based algorithmic approach in mobile adhoc networks LGF protocol implementation. Back to article page