Figure 3From: An effective implementation of security based algorithmic approach in mobile adhoc networks Black hole attack. Back to article page