L Xiao, G Sheng, X Wan, W Su… - IEEE communications …, 2018 - ieeexplore.ieee.org
In this letter, we propose a physical (PHY)-layer authentication framework to detect spoofing
attacks in underwater sensor networks. This scheme exploits the power delay profile of the …