Securing Wireless Communications at the Physical Layer
Liu, Ruoheng, Trappe, Wade (Eds.)
2010, XVI, 396 p.
Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
A collection of high-impact research results in the area of physical layer security
Serve as a valuable compendium to any researcher interested in conducting research in physical layer security
Broken down into five sections, corresponding to major thematic areas related to physical layer security
The editorial team provide perspectives for the chapters in each section
The two major forms of physical layer confidentiality are covered — secrecy extraction and secrecy dissemination
Physical layer authentication is discussed, providing coverage of physical layer security that extends beyond the conventional "secrecy"-oriented approaches to security
Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer.
Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored.
Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications.
Content Level »Research
Keywords »Artificial noise - Cooperative jamming - Crib - DES - Gaussian Channel - MIMO - Multiple-transmit antennas - RSSI - Secret wireless communication - Wireless digital communication - cryptography - interference