Fig. 4From: Enhanced security using multiple paths routine scheme in cloud-MANETsTraffic management in MANETsBack to article page