Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 1 Description of the Attack Scenarios

From: PHYAlert: identity spoofing attack detection and prevention for a wireless edge network

AAlice, Bob, and Eve are motionless in a silent environment.
BSame as A, but with some crowd flow.
CSame as A, but Eve moves slowly.
DSame as A, but Bob walks with a normal speed.
ESlower version of D
FFaster version of D
GBoth Bob and Eve walk with a normal speed.