Figure 5From: HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms Attack to HOP attempting to disclose hidden pseudonyms through ARP queries. Back to article page