Investigating the eavesdropper attack in physical layer security wireless key generation: a simulation case study.
Marco ZoliAndré Noll BarretoGerhard P. FettweisPublished in: VTC Spring (2021)
Keyphrases
- physical layer
- adhoc network
- wireless communication
- application layer
- link layer
- smart grid
- wireless networks
- mac protocol
- resource utilization
- multipath
- communication systems
- communication protocol
- network layer
- channel coding
- bit error rate
- wireless sensor networks
- communication networks
- simulation model
- wireless channels
- multi hop
- wireless ad hoc networks
- analytical model
- mac layer
- security issues