Return to Article Details A Review of Malicious Node Detection in Mobile Ad-hoc Networks Download Download PDF