Detection and Localization of Multiple Spoofing Attackers in Wireless Networks.
Jie YangYingying ChenWade TrappeJerry ChengPublished in: IEEE Trans. Parallel Distributed Syst. (2013)
Keyphrases
- computer simulation
- wireless networks
- wireless communication
- ad hoc networks
- base station
- mobile computing
- low bandwidth
- multi hop
- cellular networks
- network coding
- mobile wireless
- wireless ad hoc networks
- cross layer
- link layer
- web services
- wired networks
- wireless mesh networks
- access points
- computer networks
- response time