... was able to lis-ten to datagrams exchanged between nodes n1, n2,andn3. The second position, say1oco32,thatittookdoesnot allow it to listen to any datagrams sent from n1 to n5. ... section. Due to the increasing use of wireless communication and net-work community interest in mobile computing, industry,and academia have granted a special attention to Mobile Ad hoc and Sensor ... tech-nique is tolerant to adversaries, that try to misle ad theinvestigation by injecting false information. It allowssuspicious areas, called hotspots, where some adversariesmay reside, to be detected....