Fig. 7From: Enhanced security using multiple paths routine scheme in cloud-MANETsControl packet overhead vs. attacker nodesBack to article page