Table 7: Attacks’ scenarios.

AttackScenario descriptionScenario number

Selective forwarding and hello flooding Network with one stationary malicious node1
Network with one mobile malicious node2
Network with two stationary malicious nodes3
Network with two mobile malicious nodes4
Network with four stationary malicious nodes5
Network with four mobile malicious nodes6
Network with eight stationary malicious nodes7
Network with eight mobile malicious nodes8

Wormhole Network where the source and the destination are stationary9
Network where the source is mobile and the destination is stationary10
Network where the source is stationary and the destination is mobile11
Network where the source and the destination are mobile12