Implementation of Network Source Authentication and Path Validation Using Orthogonal Sequences.
Hao CaiTilman WolfPublished in: ICCCN (2020)
Keyphrases
- destination node
- wireless sensor networks
- hidden markov models
- virtual private network
- network model
- computer networks
- network architecture
- minimum cost
- optimal path
- security mechanisms
- biometric authentication
- path selection
- source node
- sequential patterns
- complex networks
- ad hoc networks
- network structure
- computing platform
- local area network
- peer to peer
- neural network