Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Privacy Preservation Using Network Coding Against Traffic Analysis in Wireless Network
Wireless spoofing attacks are simple to execute, yet they have a big impact on how well wireless sensor networks function. Cryptographic authentication can be used to confirm a node’s identity; however, due to...