RF Liao,
H Wen,
J Wu, F Pan, A Xu, H Song… - IEEE …, 2019 - ieeexplore.ieee.org
… 2 (b), we propose a mobile edge computing attack scenario in IoT that can be solved by the
physical layer data authentication. Attacker impersonates edge node 1 via claiming its media …