Fig. 5From: Client-side rogue access-point detection using a simple walking strategy and round-trip time analysisSimulation topology with background traffic loadBack to article page