Return to Article Details An Effective Method of Security Against Wormhole Attack Download Download PDF