𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Physical Layer Security for Wireless Sensing and Communication

✍ Scribed by Hüseyin Arslan (editor), Haji M. Furqan (editor)


Publisher
The Institution of Engineering and Technology
Year
2023
Tongue
English
Leaves
386
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference.

Physical Layer Security for Wireless Sensing and Communication covers both communication and sensing security from a broad perspective. The main emphasis is on PHY security, although other security measures are covered for the sake of completeness and as a step towards cross-layer security and cognitive security vision. After discussing the features of wireless channels from both the communication and sensing perspectives, the book details their exploitation for secure transmission utilizing various approaches. Wireless sensing and radio environment concepts are also addressed, along with the related security implications in terms of eavesdropping, disruption, manipulation, and, in general, the exploitation of wireless sensing by unauthorised users. Several solutions for these threats from the domains of wireless communication, military radars, and machine learning, are discussed.

The book provides valuable information to researchers in academia and industry, as well as engineers, developers, and advanced students in the field of cybersecurity.


πŸ“œ SIMILAR VOLUMES


Physical Layer Security for Wireless Sen
✍ HΓΌseyin Arslan, Haji M. Furqan πŸ“‚ Library πŸ“… 2023 πŸ› The Institution of Engineering and Technology 🌐 English

<p><span>Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference.</span></p><p><span>Physical Layer Security for Wireless Sensing and Communication</span><span> c

Physical Layer Approaches for Securing W
✍ Hong Wen (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p>This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication

Physical Layer Approaches for Securing W
✍ Hong Wen (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p>This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication

Physical Layer Security in Wireless Comm
✍ Xiangyun Zhou, Lingyang Song, Yan Zhang πŸ“‚ Library πŸ“… 2013 πŸ› CRC Press 🌐 English

<P>Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting th

Physical layer security in wireless comm
✍ Zhang, Yan; Song, Lingyang; Zhou, Xiangyun Sean πŸ“‚ Library πŸ“… 2014 πŸ› CRC Press 🌐 English

<P>Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting th

Securing Wireless Communications at the
✍ Zang Li, Roy Yates, Wade Trappe (auth.), Ruoheng Liu, Wade Trappe (eds.) πŸ“‚ Library πŸ“… 2010 πŸ› Springer US 🌐 English

<p><P>Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving crypto