Chaotic sequences based watermarking wireless physical layer security authentication algorithm
In recent years, wireless mobile consumers have also grown exponentially. Due to the openness and broadcasting of the wireless networks, it is easier for unauthorized users to disguise themselves as legitimate users to launch spoofing attacks, resulting in insecurity in the low-altitude industry. Re...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2025-07-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2025129/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!