Figure 4From: An effective implementation of security based algorithmic approach in mobile adhoc networks Proposed Worm-hole prevention technique. Back to article page