Advances, Systems and Applications
From: PHYAlert: identity spoofing attack detection and prevention for a wireless edge network
A | Alice, Bob, and Eve are motionless in a silent environment. |
B | Same as A, but with some crowd flow. |
C | Same as A, but Eve moves slowly. |
D | Same as A, but Bob walks with a normal speed. |
E | Slower version of D |
F | Faster version of D |
G | Both Bob and Eve walk with a normal speed. |