no code implementations • 10 Aug 2021 • Kartik Patel, Nitin Jonathan Myers, Robert W. Heath Jr
Using simulations, we study the performance of the proposed defense technique against a greedy eavesdropping strategy in a vehicle-to-infrastructure scenario.