Login / Signup
On Securing MAC Layer Broadcast Signals Against Covert Channel Exploitation in 5G, 6G & Beyond.
Reza Soosahabi
Magdy A. Bayoumi
Published in:
FNWF (2022)
Keyphrases
</>
covert channel
mac layer
network simulator
cross layer
security requirements
routing protocol
mac protocol
information security
data dissemination
access control
quality of service
mobile ad hoc networks
wireless ad hoc networks
physical layer
wireless link
wireless networks