In this scenario, the attacker attempts to impersonate both
mobile and the toilet of the user in which any request sent
from the user’s mobile will go to the attacker toilet,
meanwhile the user’s toilet will be connected to the
attacker’s mobile instead of the actual user’s mobile.
Through this scenario, the attacker will not be discovered
if SSP method applied, but using ESSP, the attacker will
be discovered and prevented to have access to the
connection as shown in Figure 3[11].