Skip to main content

Table 1 Features data: T points are related to eavesdropping, T points are not related to eavesdropping

From: Active eavesdropping detection: a novel physical layer security in wireless IoT

Mean

Ratio

\(A_{k|H_{0}}^{\left( 1 \right) }[T_{1}]\)

\(A_{k|H_{0}}^{\left( 2 \right) }[T_{1}]\)

...

...

\(A_{k|H_{0}}^{\left( 1 \right) }[T]\)

\(A_{k|H_{0}}^{\left( 2 \right) }[T]\)

\(A_{k|H_{1}}^{\left( 1 \right) }[T_{1}]\)

\(A_{k|H_{1}}^{\left( 2 \right) }[T_{1}]\)

...

...

\(A_{k|H_{1}}^{\left( 1 \right) }[T]\)

\(A_{k|H_{1}}^{\left( 2 \right) }[T]\)