𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Securing Wireless Communications at the Physical Layer

✍ Scribed by Zang Li, Roy Yates, Wade Trappe (auth.), Ruoheng Liu, Wade Trappe (eds.)


Publisher
Springer US
Year
2010
Tongue
English
Leaves
401
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer.

Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored.

Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications.

✦ Table of Contents


Front Matter....Pages 1-16
Secrecy Capacity of Independent Parallel Channels....Pages 1-18
Obtaining Secrecy through Intentional Uncertainty....Pages 19-37
Distributed Secret Sharing over the Gaussian Interference Wiretap Channel....Pages 39-40
Cooperative Jamming: The Tale of Friendly Interference for Secrecy....Pages 65-88
Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications....Pages 89-112
Secret Communication Under Channel Uncertainty....Pages 113-141
Cooperative Secrecy in Wireless Communications....Pages 143-172
Source Coding under Secrecy Constraints....Pages 173-199
Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels....Pages 201-230
Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems....Pages 231-260
Secret Key Agreement Techniques based on Multipath Propagation Characteristics....Pages 261-280
Secret Communication over Fading Channels....Pages 281-309
Fingerprints in the Ether: Channel-Based Authentication....Pages 311-333
Message Authentication: Information Theoretic Bounds....Pages 335-353
Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement....Pages 355-377
Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels....Pages 379-396

✦ Subjects


Communications Engineering, Networks; Signal, Image and Speech Processing; Data Structures, Cryptology and Information Theory; Data Encryption


πŸ“œ SIMILAR VOLUMES


Securing Wireless Communications at the
✍ Zang Li, Roy Yates, Wade Trappe (auth.), Ruoheng Liu, Wade Trappe (eds.) πŸ“‚ Library πŸ“… 2010 πŸ› Springer US 🌐 English

<p><P>Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving crypto

Securing Wireless Communications at the
✍ Ruoheng Liu, Wade Trappe πŸ“‚ Library πŸ“… 2009 πŸ› Springer 🌐 English

<P>The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods described in this book secure communications at the

Physical Layer Security in Wireless Comm
✍ Xiangyun Zhou, Lingyang Song, Yan Zhang πŸ“‚ Library πŸ“… 2013 πŸ› CRC Press 🌐 English

<P>Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting th

Physical layer security in wireless comm
✍ Zhang, Yan; Song, Lingyang; Zhou, Xiangyun Sean πŸ“‚ Library πŸ“… 2014 πŸ› CRC Press 🌐 English

<P>Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting th

Physical Layer Approaches for Securing W
✍ Hong Wen (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p>This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication

Physical Layer Security for Wireless Sen
✍ HΓΌseyin Arslan, Haji M. Furqan πŸ“‚ Library πŸ“… 2023 πŸ› The Institution of Engineering and Technology 🌐 English

<p><span>Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference.</span></p><p><span>Physical Layer Security for Wireless Sensing and Communication</span><span> c