05-06-2013, 07:46 PM
Hello,
Am writing a project on the security defenses against Sybil attack in Wireless Network. I really need advice on which tool is best to be used to simulate the wireless sensor network and the tool to be used to inject the attack.