Securing Wireless Communications At The Physical Layer


Download Securing Wireless Communications At The Physical Layer PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Securing Wireless Communications At The Physical Layer book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Securing Wireless Communications at the Physical Layer


Securing Wireless Communications at the Physical Layer

Author: Ruoheng Liu

language: en

Publisher: Springer Science & Business Media

Release Date: 2009-12-01


DOWNLOAD





This book focuses specifically on physical layer security, a burgeoning topic in security. It consists of contributions from the leading research groups in this emerging area, and for the first time important high-impact results are collected together.

Securing Wireless Communications at the Physical Layer


Securing Wireless Communications at the Physical Layer

Author: Ruoheng Liu

language: en

Publisher:

Release Date: 2011-03-18


DOWNLOAD





Physical Layer Approaches for Securing Wireless Communication Systems


Physical Layer Approaches for Securing Wireless Communication Systems

Author: Hong Wen

language: en

Publisher: Springer Science & Business Media

Release Date: 2013-02-14


DOWNLOAD





This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated. Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach using redundant antennas of MIMO systems to provide stronger security for wireless networks. The channel responses between communication peers have been explored as a form of fingerprint with spatial and temporal uniqueness. Finally, the book develops a new lightweight method of channel identification for Sybil attack and node clone detection in wireless sensor networks (WSNs).