Chaotic sequences based watermarking wireless physical layer security authentication algorithm

In recent years, wireless mobile consumers have also grown exponentially. Due to the openness and broadcasting of the wireless networks, it is easier for unauthorized users to disguise themselves as legitimate users to launch spoofing attacks, resulting in insecurity in the low-altitude industry. Re...

Full description

Saved in:
Bibliographic Details
Main Author: CHEN Songlin
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2025-07-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2025129/
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items