HOME > 상세정보

상세정보

Physical layer security in wireless communications

Physical layer security in wireless communications (3회 대출)

자료유형
단행본
개인저자
Zhou, Xiangyun Sean. Song, Lingyang. Zhang, Yan, 1977-.
서명 / 저자사항
Physical layer security in wireless communications / edited by Xiangyun Zhou, Lingyang Song, Yan Zhang.
발행사항
Boca Raton, [Florida] :   CRC Press, Taylor & Francis Group,   c2014.  
형태사항
xvii, 295 p. : ill. ; 27 cm.
총서사항
Wireless networks and mobile communications ;20
ISBN
9781466567009 (hardback) 1466567007 (hardback)
요약
"Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Comparing to the cryptographic approaches, physical layer security is a fundamentally different paradigm, where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels. Written by pioneering researchers, this book provides a systematic overview of the foundations and recent developments of this promising security technology"--
내용주기
Fundamentals of physical layer security -- Coding for wiretap channels -- LDPC codes for the Gaussian wiretrap channel -- Key generation from wireless channels -- Secrecy with feedback -- MIMO signal processing algorithms for enhanced physical layer security -- Discriminatory channel estimation for secure wireless communication -- Physical layer security in OFDMA networks -- The application of cooperative transmissions to secrecy communications -- Game theory for physical layer security on interference channels -- Ascending clock auction for physical layer security -- Relay and jammer cooperation as a coalitional game -- Stochastic geometry approaches to secrecy in large wireless networks -- Physical layer in large multihop wireless networks.
서지주기
Includes bibliographical references and index.
일반주제명
Wireless communication systems --Security measures.
000 00000cam u2200205 a 4500
001 000045859249
005 20160127181419
008 160127s2014 flua b 001 0 eng d
010 ▼a 2013026468
020 ▼a 9781466567009 (hardback)
020 ▼a 1466567007 (hardback)
035 ▼a (KERIS)REF000017431872
040 ▼a DLC ▼b eng ▼c DLC ▼e rda ▼d DLC ▼d 211009
050 0 0 ▼a TK5103.2 ▼b .P515 2014
082 0 0 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b P578
245 0 0 ▼a Physical layer security in wireless communications / ▼c edited by Xiangyun Zhou, Lingyang Song, Yan Zhang.
260 ▼a Boca Raton, [Florida] : ▼b CRC Press, Taylor & Francis Group, ▼c c2014.
300 ▼a xvii, 295 p. : ▼b ill. ; ▼c 27 cm.
490 1 ▼a Wireless networks and mobile communications ; ▼v 20
504 ▼a Includes bibliographical references and index.
505 0 0 ▼t Fundamentals of physical layer security -- ▼t Coding for wiretap channels -- ▼t LDPC codes for the Gaussian wiretrap channel -- ▼t Key generation from wireless channels -- ▼t Secrecy with feedback -- ▼t MIMO signal processing algorithms for enhanced physical layer security -- ▼t Discriminatory channel estimation for secure wireless communication -- ▼t Physical layer security in OFDMA networks -- ▼t The application of cooperative transmissions to secrecy communications -- ▼t Game theory for physical layer security on interference channels -- ▼t Ascending clock auction for physical layer security -- ▼t Relay and jammer cooperation as a coalitional game -- ▼t Stochastic geometry approaches to secrecy in large wireless networks -- ▼t Physical layer in large multihop wireless networks.
520 ▼a "Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Comparing to the cryptographic approaches, physical layer security is a fundamentally different paradigm, where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels. Written by pioneering researchers, this book provides a systematic overview of the foundations and recent developments of this promising security technology"-- ▼c Provided by publisher.
650 0 ▼a Wireless communication systems ▼x Security measures.
700 1 ▼a Zhou, Xiangyun Sean.
700 1 ▼a Song, Lingyang.
700 1 ▼a Zhang, Yan, ▼d 1977-.
830 0 ▼a Wireless networks and mobile communications ; ▼v 20.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 P578 등록번호 121235458 (3회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels.

Written by pioneering researchers, Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks.

The book starts with a brief introduction to physical layer security. The rest of the book is organized into four parts based on the different approaches used for the design and analysis of physical layer security techniques:

  1. Information Theoretic Approaches: introduces capacity-achieving methods and coding schemes for secure communication, as well as secret key generation and agreement over wireless channels
  2. Signal Processing Approaches: covers recent progress in applying signal processing techniques to design physical layer security enhancements
  3. Game Theoretic Approaches: discusses the applications of game theory to analyze and design wireless networks with physical layer security considerations
  4. Graph Theoretic Approaches: presents the use of tools from graph theory and stochastic geometry to analyze and design large-scale wireless networks with physical layer security constraints

Presenting high-level discussions along with specific examples, illustrations, and references to conference and journal articles, this is an ideal reference for postgraduate students, researchers, and engineers that need to obtain a macro-level understanding of physical layer security and its role in future wireless communication systems.



Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks. Presenting high-level discussions along with specific examples, and illustrations, this is an ideal reference for anyone that needs to obtain a macro-level understanding of physical layer security and its role in future wireless communication systems.




정보제공 : Aladin

목차

Fundamentals of Physical Layer Security
Information-Theoretic Secrecy
     Shannon’s Cipher System and Perfect Secrecy
     Information-Theoretic Secrecy Metrics
Secret Communication Over Noisy Channels 
     Wiretap Channel Model 
     Coding Mechanisms for Secret Communication
Secret-Key Generation from Noisy Channels
     Channel Model for Secret-Key Generation
     Coding Mechanisms for Secret-Key Generation
Conclusion
References

Coding for Wiretap Channels
Coding for the Wiretap Channel II
     Basics of Error Correcting Codes 
     Wiretap II Codes
Wiretap Coding with Polar Codes 
     Polar Codes 
     Polar Wiretap Codes
Coding for Gaussian Wiretap Channels 
     Error Probability and Secrecy Gain 
     Unimodular Lattice Codes
Conclusion
References

LDPC Codes for the Gaussian Wiretap Channel
Channel Model and Basic Notions
Coding for Security
     Asymptotic Analysis
     Optimized Puncturing Distributions 
     Reducing SNR Loss 
     Finite Block Lengths
System Aspects
Concluding Remarks
References

Key Generation From Wireless Channels

Introduction
Information Theoretic Models for Key Generation 
     Key Generation via Unlimited Public Discussion 
     Key Generation with Rate Constraint in Public Discussion 
     Key Generation with Side-information at Eve
Basic Approaches for Key Generation via Wireless Networks
A Joint Source-Channel Key Agreement Protocol 
     Key Agreement With a Public Channel 
     Key Agreement Without a Public Channel
Relay-Assisted Key Generation With a Public Channel
     Relay-Assisted Key Generation with One Relay 
     Relay-Assisted Key Generation with Multiple Relays 
     Relay-Oblivious Key Generation
Key Agreement with the Presence of an Active Attacker 
     Training Phase 
     Key Generation Phase
Conclusion
Acknowledgement
References

Secrecy With Feedback
Introduction
The Gaussian Two-Way Wiretap Channel
Achieving Secrecy using Public Discussion
Achieving Secrecy using Cooperative Jamming 
     Full Duplex Node 
     Half Duplex Node
Achieving Secrecy through Discussion and Jamming 
     Jamming with Codewords 
     Secrecy Through Key Generation
     Block Markov Coding Scheme
When the Eavesdropper Channel States Are Not Known
Converse 
     Outer Bounds 
     Discussion
Conclusion
Proof of Theorem 5.7.5
Proof of Theorem 5.7.6
References

MIMO Signal Processing Algorithms for Enhanced Physical Layer Security
Introduction
Physical-Layer Security 
     Signal Processing Aspects 
     Secrecy Performance Metrics 
     The Role of CSI
MIMO Wiretap Channels 
     Complete CSI
     Partial CSI
MIMO Wiretap Channel with an External Helper
MIMO Broadcast Channel
MIMO Interference Channel
MIMO Relay Wiretap Networks 
     Relay-Aided Cooperation 
     Untrusted Relaying
Conclusions
References

Discriminatory Channel Estimation for Secure Wireless Communication
Introduction
Discriminatory Channel Estimation ? Basic Concept
DCE via Feedback and Retraining 
     Two-Stage Feedback-and-Retraining 
     Multiple Stage Feedback and Retraining
     Simulation Results and Discussions
Discriminatory Channel Estimation via Two-Way Training 
     Two-Way DCE Design for Reciprocal Channels 
     Two-Way DCE Design for Non-Reciprocal Channels 
     Simulation Results and Discussions
Conclusions and Discussions
Acknowledgement
References

Physical Layer Security in OFDMA Networks
Introduction
Related Works on Secure OFDM/OFDMA Networks 
     Secure OFDM Channel 
     Secure OFDMA Cellular Networks 
     Secure OFDMA Relay Networks 
     Secure OFDM with Implementation Issues
Basics of Resource Allocation for Secret Communications 
     Power Allocation Law for Secrecy 
     Multiple Eavesdroppers
Resource Allocation for Physical Layer Security in OFDMA Networks
     Problem Formulation 
     Optimal Policy 
     Suboptimal Algorithm 
     Complexity 
     Numerical Examples 
     Discussion on False CSI Feedback
Conclusions and Open Issues
References

The Application of Cooperative Transmissions to Secrecy Communications
Introduction
When all Nodes are Equipped with a Single Antenna 
     Cooperative Jamming 
     Relay Chatting
MIMO Relay Secrecy Communication Scenarios 
     When CSI of eavesdroppers Is known 
     When CSI of eavesdroppers Is unknown
Conclusion
Acknowledgement
References

Game Theory for Physical Layer Security on Interference Channels
Introduction
System Models and Scenarios 
     Standard MISO Interference Channel 
     MISO Interference Channel with Private Messages 
     MISO Interference Channel with Public Feedback and Private Messages 
     Discussion and Comparison of Scenarios
Non-Cooperative Solutions 
     Non-Cooperative Games in Strategic Form 
     Solution for the MISO Interference Channel Scenarios
Cooperative Solutions 
     Bargaining Solutions 
     Nash Bargaining Solution 
     Bargaining Algorithm in the Edgeworth-Box 
     Walras Equilibrium Solution
Illustrations and Discussions 
     Comparison of Utility Regions 
     Non-Cooperative and Cooperative Operating Points 
     Bargaining Algorithm Behaviour
Conclusions
Appendix: Proofs 
     Proof of Theorem 10.3.1 
     Proof of Theorem 10.4.1 
     Proof of Theorem 10.4.2 
     Proof of Theorem 10.4.3
References

Ascending Clock Auction for Physical Layer Security
Introduction 
     Cooperative Jamming for Physical Layer Security 
     Game Theory Based Jamming Power Allocation 
     Ascending Auctions 
     Chapter Outline
System Model and Problem Formulation 
     System Model 
     Source’s Utility Function 
     Jammer’s Utility Function
Auction-Based Jamming Power Allocation Schemes 
     Power Allocation Scheme based on Single Object Pay-as-Bid Ascending Clock Auction (P-ACA-S)
     Power Allocation Scheme based on Traditional Ascending Clock Auction (P-ACA-T) 
     Power Allocation Scheme based on Alternative Ascending Clock Auction (P-ACA-A)
Properties of the Proposed Auction-Based Power Allocation Schemes
     Optimal Jamming Power for Each Source 
     Convergence 
     Cheat-Proof
     Social Welfare Maximization 
     Complexity and Overhead
Conclusions and Open Issues
References

Relay and Jammer Cooperation as a Coalitional Game
Introduction 
     Cooperative Relaying and Cooperative Jamming 
     Relay and Jammer Selection 
     Coalitional Game Theory 
     Chapter Outline
System Model and Problem Formulation
Relay and Jammer Cooperation as a Coalitional Game 
     Coalitional Game Definition 
     Properties of the Proposed Coalitional Game
Coalition Formation Algorithm 
     Coalition Formation Concepts 
     Merge-and-Split Coalition Formation Algorithm
Conclusions and Open Issues
References

Stochastic Geometry Approaches to Secrecy in Large Wireless Networks
     Introduction 
     Motivation 
     Stochastic Geometry Approaches
Secrecy Graph 
     Network and Graph Model 
     Local Connectivity Properties 
     Global Connectivity Properties 
     Connectivity Enhancements
Secrecy Transmission Capacity 
     Network Model 
     Capacity Formulation 
     Illustrative Example
Current Limitations and Future Directions
References

Physical Layer Secrecy in Large Multi-Hop Wireless Networks
Introduction
Background: Physical-Layer Security in One-Hop Networks
Secure Connectivity: The Secrecy Graph
Secure Capacity 
     Background: Throughput Scaling in Large Wireless Networks 
     Secrecy Scaling with Known Eavesdropper Location 
     Secrecy Scaling with Unknown Eavesdropper Locations
Conclusion and Future Work
Acknowledgement
References


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)