Research Article
Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information
Algorithm 2
The authenticator execution algorithm.
Input: | 1: | 2: For in do | 3: | 4: | 5: End for | 6: | 7: | 8: Ifthen | //train Split layer and merged layer | 9: For in do | 10: | 11: End for | 12: | 13: End if | 14: Return |
|