Cargando…

Securing Wireless Communications at the Physical Layer

Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Liu, Ruoheng (Editor ), Trappe, Wade (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4419-1385-2
003 DE-He213
005 20220114192536.0
007 cr nn 008mamaa
008 100301s2010 xxu| s |||| 0|eng d
020 |a 9781441913852  |9 978-1-4419-1385-2 
024 7 |a 10.1007/978-1-4419-1385-2  |2 doi 
050 4 |a TK5101-5105.9 
072 7 |a TJK  |2 bicssc 
072 7 |a TEC041000  |2 bisacsh 
072 7 |a TJK  |2 thema 
082 0 4 |a 621.382  |2 23 
245 1 0 |a Securing Wireless Communications at the Physical Layer  |h [electronic resource] /  |c edited by Ruoheng Liu, Wade Trappe. 
250 |a 1st ed. 2010. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2010. 
300 |a XVI, 396 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Secrecy Capacity of Independent Parallel Channels -- Obtaining Secrecy through Intentional Uncertainty -- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel -- Cooperative Jamming: The Tale of Friendly Interference for Secrecy -- Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications -- Secret Communication Under Channel Uncertainty -- Cooperative Secrecy in Wireless Communications -- Source Coding under Secrecy Constraints -- Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels -- Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems -- Secret Key Agreement Techniques based on Multipath Propagation Characteristics -- Secret Communication over Fading Channels -- Fingerprints in the Ether: Channel-Based Authentication -- Message Authentication: Information Theoretic Bounds -- Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement -- Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels. 
520 |a Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer. Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored. Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications. 
650 0 |a Telecommunication. 
650 0 |a Signal processing. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Communications Engineering, Networks. 
650 2 4 |a Signal, Speech and Image Processing . 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Cryptology. 
700 1 |a Liu, Ruoheng.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Trappe, Wade.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781441914101 
776 0 8 |i Printed edition:  |z 9781489983756 
776 0 8 |i Printed edition:  |z 9781441913845 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4419-1385-2  |z Texto Completo 
912 |a ZDB-2-ENG 
912 |a ZDB-2-SXE 
950 |a Engineering (SpringerNature-11647) 
950 |a Engineering (R0) (SpringerNature-43712)