Secrecy, Covertness and Authentication in Wireless Communications: Physical Layer Security Approach: Wireless Networks
Autor Yulong Shen, Yuanyu Zhang, Xiaohong Jiangen Limba Engleză Hardback – 17 oct 2023
When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming. Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems based on channel features and/or radiometric features of transceivers. In addition, this book presents security-aware routing in wireless networks based on physical layer secure communication techniques.
This book targets researchers in the fields of physical layer security and wireless communications security. Advanced-level students in electronic engineering or computer science studying these security topics will also want to purchase this book as a secondary textbook.
Din seria Wireless Networks
- 20% Preț: 620.74 lei
- 20% Preț: 798.27 lei
- 18% Preț: 1171.86 lei
- 20% Preț: 948.50 lei
- 20% Preț: 865.27 lei
- 20% Preț: 1121.47 lei
- 15% Preț: 618.22 lei
- Preț: 371.35 lei
- 15% Preț: 612.74 lei
- 20% Preț: 1006.40 lei
- Preț: 375.35 lei
- 18% Preț: 700.13 lei
- 20% Preț: 1246.70 lei
- 20% Preț: 729.12 lei
- 15% Preț: 609.08 lei
- 24% Preț: 794.49 lei
- 20% Preț: 306.62 lei
- 18% Preț: 699.49 lei
- 20% Preț: 621.37 lei
- 15% Preț: 609.08 lei
- 15% Preț: 616.49 lei
- 20% Preț: 622.65 lei
- 20% Preț: 951.02 lei
- 20% Preț: 646.36 lei
- 18% Preț: 856.20 lei
- 18% Preț: 699.96 lei
- 18% Preț: 748.69 lei
- 18% Preț: 966.12 lei
- Preț: 439.86 lei
- 18% Preț: 697.38 lei
- 20% Preț: 622.34 lei
- 18% Preț: 702.52 lei
- 20% Preț: 553.25 lei
- 20% Preț: 785.32 lei
- 24% Preț: 784.38 lei
- 18% Preț: 752.35 lei
- 18% Preț: 699.06 lei
- 18% Preț: 757.96 lei
- 20% Preț: 1118.28 lei
- 20% Preț: 308.72 lei
- 20% Preț: 563.08 lei
- 20% Preț: 947.51 lei
- 18% Preț: 974.46 lei
- 20% Preț: 310.17 lei
- 20% Preț: 618.98 lei
- 24% Preț: 622.89 lei
Preț: 1123.86 lei
Preț vechi: 1404.82 lei
-20% Nou
Puncte Express: 1686
Preț estimativ în valută:
215.09€ • 226.91$ • 179.25£
215.09€ • 226.91$ • 179.25£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031384646
ISBN-10: 3031384644
Ilustrații: XVI, 360 p. 141 illus., 90 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.7 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Wireless Networks
Locul publicării:Cham, Switzerland
ISBN-10: 3031384644
Ilustrații: XVI, 360 p. 141 illus., 90 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.7 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Wireless Networks
Locul publicării:Cham, Switzerland
Cuprins
Chapter 1 Introduction.- Chapter 2 Physical Layer Secure Communications.- Chapter 3 Physical Layer Covert Communications.- Chapter 4 Physical Layer Authentication.- Chapter 5 Secure Routing.- Chapter 6 Summary.
Notă biografică
Yulong Shen received the B.S. and M.S. degrees in computer science and the Ph.D. degree in cryptography from Xidian University, Xi’an, China, in 2002, 2005, and 2008, respectively. He is currently a Professor at the School of Computer Science and Technology, Xidian University, where he is also an Associate Director of the Shaanxi Key Laboratory of Network and System Security and a member of the State Key Laboratory of Integrated Services Networks. His research interests include wireless network security and cloud computing security. He has also served on the technical program committees of several international conferences, including ICEBE, INCoS, CIS, and SOWN.
Yuanyu Zhang received the B.S. and M.S. degrees from Xidian University, Xi’an, China, in 2011 and 2014, respectively, and the Ph.D. degree from Future University Hakodate, Hakodate, Hokkaido, Japan, in 2017. He is currently an Associate Professor at the School of Computer Science and Technology, Xidian University, Xi’an, Shaanxi, China. Prior to joining Xidian University, he was an Assistant Professor at the Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Japan. His research interests include Satellite Internet security, physical layer authentication, and physical layer security of wireless communications.
Xiaohong Jiang received his B.S., M.S. and Ph.D. degrees in 1989, 1992, and 1999 respectively, all from Xidian University, China. He is currently a full professor at Future University Hakodate, Japan. Before joining Future University, Dr. Jiang was an Associate professor, at Tohoku University, from Feb. 2005 to Mar. 2010. His research interests include computer communications networks, mainly wireless networks and optical networks, network security, routers/switches design, etc. He has published over 300 technical papers at premium international journals and conferences, which include over 70 papers published in top IEEE journals and top IEEE conferences, like IEEE/ACM Transactions on Networking, IEEE Journal of Selected Areas on Communications, IEEE Transactions on Parallel and Distributed Systems, IEEE INFOCOM
Textul de pe ultima copertă
This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems. In particular, this book covers three security aspects of wireless communications. It includes secrecy, i.e., preventing eavesdroppers from intercepting information from transmitted wireless signals, covertness, i.e., hiding the transmitted signals themselves from malicious wardens and authentication, i.e., authenticating the identities of communicating entities.
When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming. Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems based on channel features and/or radiometric features of transceivers. In addition, this book presents security-aware routing in wireless networks based on physical layer secure communication techniques.
This book targets researchers in the fields of physical layer security and wireless communications security. Advanced-level students in electronic engineering or computer science studying these security topics will also want to purchase this book as a secondary textbook.
When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming. Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems based on channel features and/or radiometric features of transceivers. In addition, this book presents security-aware routing in wireless networks based on physical layer secure communication techniques.
This book targets researchers in the fields of physical layer security and wireless communications security. Advanced-level students in electronic engineering or computer science studying these security topics will also want to purchase this book as a secondary textbook.
Caracteristici
Covers a wider range of security aspects in wireless communication Discusses practical challenges faced today like the techniques of physical layer secure communication Provides potential applications in future wireless communication systems