Figure 5From: An effective implementation of security based algorithmic approach in mobile adhoc networks Packet loss comparison graph. Back to article page