Figure 8From: Intrusion tolerant QoS provision in mobile multihop relay networks Processing delay according to malicious nodes number. Back to article page