Fig. 9From: Channel hopping scheme to mitigate jamming attacks in wireless LANsComparison of analysis result by Eq. (10) with the measurement result when there is no attackerBack to article page