Physical Layer Authentication Schemes Against Clone Node and Sybil Attacks in Wireless Industrial Internet.
Songlin ChenZhibo PangHong WenYu KanTengyue ZhangPublished in: ICII (2019)
Keyphrases
- physical layer
- security mechanisms
- wireless communication
- adhoc network
- malicious nodes
- wireless sensor networks
- link layer
- resource constrained
- communication technologies
- security issues
- application layer
- wireless networks
- mac protocol
- multipath
- multi hop
- network layer
- resource utilization
- communication systems
- smart card
- computer simulation
- communication protocol
- energy efficient
- sensor nodes
- smart grid
- communication networks
- access control
- bit error rate
- channel coding
- watermarking scheme
- fading channels
- operating system
- energy consumption
- sensor networks
- cross layer
- security protocols
- wireless channels
- base station