The document proposes and analyzes several radio resource tests that can be used to detect Sybil attacks in wireless ad hoc networks. It introduces an optimized sender test, receiver test, and collision test. It then analyzes and compares the tests based on their vulnerability to collusion, message cost, resource consumption, synchronization requirements, and ability to detect Sybil identities. The analysis shows that the optimized sender test is best able to handle collusion but requires strong synchronization, while the collision test requires weak synchronization but is more vulnerable to collusion.