Fig. 9From: Identity attack detection system for 802.11-based ad hoc networksAnalysis of 1-hop and 2-hop neighbours. a Intersecting area of overlap between two disks and b two disks imitating 1-hop and 2-hop nodesBack to article page