Skip to main content

Advances, Systems and Applications

Table 1 Description of the Attack Scenarios

From: PHYAlert: identity spoofing attack detection and prevention for a wireless edge network

A

Alice, Bob, and Eve are motionless in a silent environment.

B

Same as A, but with some crowd flow.

C

Same as A, but Eve moves slowly.

D

Same as A, but Bob walks with a normal speed.

E

Slower version of D

F

Faster version of D

G

Both Bob and Eve walk with a normal speed.