Detection of man-in-the-middle attacks using physical layer wireless security techniques.
Le WangAlexander M. WyglinskiPublished in: Wirel. Commun. Mob. Comput. (2016)
Keyphrases
- physical layer
- wireless communication
- application layer
- link layer
- network layer
- adhoc network
- resource utilization
- multipath
- wireless networks
- mac protocol
- communication systems
- communication protocol
- ddos attacks
- wireless channels
- bit error rate
- smart grid
- wireless sensor networks
- multi hop
- watermarking scheme
- communication networks
- channel coding
- computer simulation
- security protocols
- communication technologies
- network architecture
- error correction
- fading channels
- end to end
- quality of service
- access control