Return to Article Details Detection and Prevention of Wormhole Attack in Mobile Ad-Hoc Networks Using Trust Tunneling Download Download PDF