Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 2 of 2 matches in All Departments
Physical layer security is emerging as a promising means of ensuring secrecy in wireless communications. The key idea is to exploit the characteristics of wireless channels such as fading or noise to transmit a message from the source to the intended receiver while keeping this message confidential from eavesdroppers. Topics covered in Trusted Communications with Physical Layer Security for 5G and Beyond include secrecy metrics for physical layer security over fading channels; trusted wireless communications with spatial multiplexing; directional modulation enabled physical layer wireless security; secure waveform for 5G systems; confidential and energy efficient communications using physical layer security; secure data networks with channel uncertainty; antenna selection strategies for wiretap channels; physical layer security for massive MIMO systems, millimeter wave cellular networks, non-orthogonal multiple access, multiuser relay networks, cognitive radio networks, MIMOME-OFDM systems; wirelessly powered communication systems and D2D-enabled cellular networks; and security solutions and applications at the physical layer, including case studies of secret key generation and secrecy coding in communication nodes and terminals.
Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels. Written by pioneering researchers, Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks. The book starts with a brief introduction to physical layer security. The rest of the book is organized into four parts based on the different approaches used for the design and analysis of physical layer security techniques: Information Theoretic Approaches: introduces capacity-achieving methods and coding schemes for secure communication, as well as secret key generation and agreement over wireless channels Signal Processing Approaches: covers recent progress in applying signal processing techniques to design physical layer security enhancements Game Theoretic Approaches: discusses the applications of game theory to analyze and design wireless networks with physical layer security considerations Graph Theoretic Approaches: presents the use of tools from graph theory and stochastic geometry to analyze and design large-scale wireless networks with physical layer security constraints Presenting high-level discussions along with specific examples, illustrations, and references to conference and journal articles, this is an ideal reference for postgraduate students, researchers, and engineers that need to obtain a macro-level understanding of physical layer security and its role in future wireless communication systems.
|
You may like...
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter
Paperback
|