Fig. 8From: Identity attack detection system for 802.11-based ad hoc networksConnected graph of spoofing in different radio ranges. Shows the radio ranges of the global detection. The participating mobile nodes are A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P and Q, which are divided in the five different radio ranges of I, II, III, IV and V. The underlined letters represent the reference nodesBack to article page