Fig. 5From: Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh networkNS2 simulation scenarioBack to article page