Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques

"In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the ne...

Full description

Bibliographic Details
Main Author: Wang, Le
Other Authors: Alexander M. Wyglinski, Advisor
Format: Others
Published: Digital WPI 2013
Subjects:
Online Access:https://digitalcommons.wpi.edu/etd-theses/992
https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1991&context=etd-theses

Similar Items