Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Privacy Preservation Using Network Coding Against Traffic Analysis in Wireless Network

    Wireless spoofing attacks are simple to execute, yet they have a big impact on how well wireless sensor networks function. Cryptographic authentication can be used to confirm a node’s identity; however, due to...

    A Antonidoss, K. Dinakaran, P. Valarmathie in Proceedings of Second International Confer… (2024)