Figure 2From: SPM: Source Privacy for Mobile Ad Hoc NetworksSimulation results of the proposed secure routing scheme. Energy consumption of normal nodesEnergy consumption of super nodesCommunication delayMessage delivery ratioBack to article page