Fig. 3From: Secure routing protocol based on dynamic reputation and load balancing in wireless mesh networksIdentification Rate of Malicious NodesBack to article page