Login / Signup
On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding.
Lorenzo Taponecco
Pericle Perazzo
Antonio A. D'Amico
Gianluca Dini
Published in:
IEEE Commun. Lett. (2014)
Keyphrases
</>
upper bound
distance function
euclidean distance
distance measure
wireless lan
hamming distance
distance matrix
intelligent agent technology
information retrieval
web intelligence
countermeasures
detection mechanism
denial of service attacks
attack detection