521497.fig.005a
(a)
521497.fig.005b
(b)
521497.fig.005c
(c)
521497.fig.005d
(d)
Figure 5: Intrusion detection rate (a), false positives rate (b), memory usage (c), and traffic (d) depending on the network mobility.