Internet-of-Things (iot) devices that are limited in power and processing are
susceptible to physical layer (PHY) spoofing (signal exploitation) attacks
owing to their inability to implement a full-blown protocol stack for security.
The overwhelming adoption of multicarrier techniques