IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning.
Dania MarabissiLorenzo MucchiAndrea StomaciPublished in: Future Internet (2022)
Keyphrases
- physical layer
- machine learning
- network layer
- wireless communication
- application layer
- mac protocol
- resource utilization
- smart grid
- communication systems
- management system
- multipath
- bit error rate
- channel coding
- multi hop
- ad hoc networks
- communication protocol
- access control
- ddos attacks
- wireless networks
- shortest path
- cloud computing