|
Showing 1 - 2 of
2 matches in All Departments
Physical layer security is emerging as a promising means of
ensuring secrecy in wireless communications. The key idea is to
exploit the characteristics of wireless channels such as fading or
noise to transmit a message from the source to the intended
receiver while keeping this message confidential from
eavesdroppers. Topics covered in Trusted Communications with
Physical Layer Security for 5G and Beyond include secrecy metrics
for physical layer security over fading channels; trusted wireless
communications with spatial multiplexing; directional modulation
enabled physical layer wireless security; secure waveform for 5G
systems; confidential and energy efficient communications using
physical layer security; secure data networks with channel
uncertainty; antenna selection strategies for wiretap channels;
physical layer security for massive MIMO systems, millimeter wave
cellular networks, non-orthogonal multiple access, multiuser relay
networks, cognitive radio networks, MIMOME-OFDM systems; wirelessly
powered communication systems and D2D-enabled cellular networks;
and security solutions and applications at the physical layer,
including case studies of secret key generation and secrecy coding
in communication nodes and terminals.
Physical layer security has recently become an emerging technique
to complement and significantly improve the communication security
of wireless networks. Compared to cryptographic approaches,
physical layer security is a fundamentally different paradigm where
secrecy is achieved by exploiting the physical layer properties of
the communication system, such as thermal noise, interference, and
the time-varying nature of fading channels. Written by pioneering
researchers, Physical Layer Security in Wireless Communications
supplies a systematic overview of the basic concepts, recent
advancements, and open issues in providing communication security
at the physical layer. It introduces the key concepts, design
issues, and solutions to physical layer security in single-user and
multi-user communication systems, as well as large-scale wireless
networks. The book starts with a brief introduction to physical
layer security. The rest of the book is organized into four parts
based on the different approaches used for the design and analysis
of physical layer security techniques: Information Theoretic
Approaches: introduces capacity-achieving methods and coding
schemes for secure communication, as well as secret key generation
and agreement over wireless channels Signal Processing Approaches:
covers recent progress in applying signal processing techniques to
design physical layer security enhancements Game Theoretic
Approaches: discusses the applications of game theory to analyze
and design wireless networks with physical layer security
considerations Graph Theoretic Approaches: presents the use of
tools from graph theory and stochastic geometry to analyze and
design large-scale wireless networks with physical layer security
constraints Presenting high-level discussions along with specific
examples, illustrations, and references to conference and journal
articles, this is an ideal reference for postgraduate students,
researchers, and engineers that need to obtain a macro-level
understanding of physical layer security and its role in future
wireless communication systems.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R375
R347
Discovery Miles 3 470
|