Fig. 2
From: Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs

Block diagram of DSA-Auth methodology.
From: Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs
Block diagram of DSA-Auth methodology.