Research Article
Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network
Table 7
Attacks’ scenarios.
| Attack | Scenario description | Scenario number |
| Selective forwarding and hello flooding | Network with one stationary malicious node | 1 | Network with one mobile malicious node | 2 | Network with two stationary malicious nodes | 3 | Network with two mobile malicious nodes | 4 | Network with four stationary malicious nodes | 5 | Network with four mobile malicious nodes | 6 | Network with eight stationary malicious nodes | 7 | Network with eight mobile malicious nodes | 8 |
| Wormhole | Network where the source and the destination are stationary | 9 | Network where the source is mobile and the destination is stationary | 10 | Network where the source is stationary and the destination is mobile | 11 | Network where the source and the destination are mobile | 12 |
|
|