𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Physical layer security in wireless communications

✍ Scribed by Zhang, Yan; Song, Lingyang; Zhou, Xiangyun Sean


Publisher
CRC Press
Year
2014
Tongue
English
Leaves
308
Series
Wireless networks and mobile communications series
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels.

Written by pioneering researchers, Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks.

The book starts with a brief introduction to physical layer security. The rest of the book is organized into four parts based on the different approaches used for the design and analysis of physical layer security techniques:

  1. Information Theoretic Approaches: introduces capacity-achieving methods and coding schemes for secure communication, as well as secret key generation and agreement over wireless channels
  2. Signal Processing Approaches: covers recent progress in applying signal processing techniques to design physical layer security enhancements
  3. Game Theoretic Approaches: discusses the applications of game theory to analyze and design wireless networks with physical layer security considerations
  4. Graph Theoretic Approaches: presents the use of tools from graph theory and stochastic geometry to analyze and design large-scale wireless networks with physical layer security constraints

Presenting high-level discussions along with specific examples, illustrations, and references to conference and journal articles, this is an ideal reference for postgraduate students, researchers, and engineers that need to obtain a macro-level understanding of physical layer security and its role in future wireless communication systems.

✦ Table of Contents


Content: 1. Fundamentals of physical layer security --
2. Coding for wiretap channels --
3. LDPC codes for the Gaussian wiretap channel --
4. Key generation from wireless channels --
5. Secrecy with feedback --
6. MIMO signal processing algorithms for enhanced physical layer security --
7. Discriminatory channel estimation for secure wireless communication --
8. Physical layer security in OFDMA networks --
9. The application of cooperative transmissions to secrecy communications --
10. Game theory for physical layer security on interference channels --
11. Ascending clock auction for physical layer security --
12. Relay and jammer cooperation as a coalitional game --
13. Stochastic geometry approaches to secrecy in large wireless networks --
14. Physical layer secrecy in large multihop wireless networks.

✦ Subjects


Wireless communication systems;Security measures.;COMPUTERS;Security;General.


πŸ“œ SIMILAR VOLUMES


Physical Layer Security in Wireless Comm
✍ Xiangyun Zhou, Lingyang Song, Yan Zhang πŸ“‚ Library πŸ“… 2013 πŸ› CRC Press 🌐 English

<P>Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting th

Securing Wireless Communications at the
✍ Zang Li, Roy Yates, Wade Trappe (auth.), Ruoheng Liu, Wade Trappe (eds.) πŸ“‚ Library πŸ“… 2010 πŸ› Springer US 🌐 English

<p><P>Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving crypto

Securing Wireless Communications at the
✍ Zang Li, Roy Yates, Wade Trappe (auth.), Ruoheng Liu, Wade Trappe (eds.) πŸ“‚ Library πŸ“… 2010 πŸ› Springer US 🌐 English

<p><P>Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving crypto

Securing Wireless Communications at the
✍ Ruoheng Liu, Wade Trappe πŸ“‚ Library πŸ“… 2009 πŸ› Springer 🌐 English

<P>The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods described in this book secure communications at the

Physical Layer Approaches for Securing W
✍ Hong Wen (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p>This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication

Physical Layer Security for Wireless Sen
✍ HΓΌseyin Arslan, Haji M. Furqan πŸ“‚ Library πŸ“… 2023 πŸ› The Institution of Engineering and Technology 🌐 English

<p><span>Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference.</span></p><p><span>Physical Layer Security for Wireless Sensing and Communication</span><span> c