Review Article

Information Security of PHY Layer in Wireless Networks

Figure 2

Attacks and defense in PHY layer.