Skip to main content
  • Book
  • © 2010

Securing Wireless Communications at the Physical Layer

  • A collection of high-impact research results in the area of physical layer security will serve as a valuable compendium to any researcher interested in conducting research in physical layer security
  • The book will be broken down into five sections, corresponding to major thematic areas related to physical layer security
  • The editorial team will provide perspectives for the chapters in each section
  • The two major forms of physical layer confidentiality will be covered—secrecy extraction and secrecy dissemination
  • Physical layer authentication will be discussed, providing a coverage of physical layer security that extends beyond the conventional "secrecy"-oriented approaches to security
  • Includes supplementary material: sn.pub/extras

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 chapters)

  1. Front Matter

    Pages 1-16
  2. Secrecy Capacity of Independent Parallel Channels

    • Zang Li, Roy Yates, Wade Trappe
    Pages 1-18
  3. Obtaining Secrecy through Intentional Uncertainty

    • Satashu Goel, Rohit Negi
    Pages 19-37
  4. Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications

    • Xiaojun Tang, Predrag Spasojević, Ruoheng Liu, H. Vincent Poor
    Pages 89-112
  5. Secret Communication Under Channel Uncertainty

    • Yingbin Liang, H. Vincent Poor, Shlomo Shamai (Shitz)
    Pages 113-141
  6. Cooperative Secrecy in Wireless Communications

    • Sennur Ulukus, Ersen Ekrem
    Pages 143-172
  7. Source Coding under Secrecy Constraints

    • Deniz Gündüz, Elza Erkip, H. Vincent Poor
    Pages 173-199
  8. Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels

    • Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, Alex Reznik
    Pages 201-230
  9. Secret Communication over Fading Channels

    • B. Azimi-Sadjadi, A. Kiayias, A. Mercado, B. Yener
    Pages 281-309
  10. Fingerprints in the Ether: Channel-Based Authentication

    • Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe
    Pages 311-333
  11. Message Authentication: Information Theoretic Bounds

    • Lifeng Lai, Hesham El Gamal, H. Vincent Poor
    Pages 335-353

About this book

Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer.

Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored.

Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications.

Editors and Affiliations

  • Dept. Electrical Engineering, Princeton University, Princeton, U.S.A.

    Ruoheng Liu

  • Technology Centre of New Jersey, Rutgers University, North Brunswick, U.S.A.

    Wade Trappe

Bibliographic Information

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access