Return to Article Details Discover and Verifying Authentication of Nearest Nodes in Mobile Ad hoc Networks Download Download PDF