Chaotic sequences based watermarking wireless physical layer security authentication algorithm
In recent years, wireless mobile consumers have also grown exponentially. Due to the openness and broadcasting of the wireless networks, it is easier for unauthorized users to disguise themselves as legitimate users to launch spoofing attacks, resulting in insecurity in the low-altitude industry. Re...
Saved in:
| Main Author: | CHEN Songlin |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2025-07-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2025129/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Chaotic Watermarking for Authentication
by: Melad Saeed
Published: (2013-07-01) -
Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges
by: LU Xinjin, et al.
Published: (2024-10-01) -
Efficient three-party authenticated key agreement protocol based on chaotic map
by: Xiong LI, et al.
Published: (2016-06-01) -
Physical Layer Security Based on Chaotic Spatial Symbol Transforming in Fiber-Optic Systems
by: Kai Zhang, et al.
Published: (2018-01-01) -
Chaos-Based Dynamic Authentication for Secure Telehealth in Smart Cities
by: Mostafa Nofal, et al.
Published: (2025-03-01)