This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
SDMmag logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
SDMmag logo
  • EMAGAZINE
    • eMagazine
    • Archive Issues
    • Monitoring Today
    • Contact
    • Advertise
    • Subscribe
  • PRODUCTS
  • NEWS
    • SDM Newswire
    • COVID-19 Coverage
  • EXCLUSIVES
    • SDM 100
    • Top Systems Integrator Report
    • Annual Industry Forecast
    • State of the Market Series
    • Dealer of the Year
    • Systems Integrator of the Year
    • Project of the Year
  • TOPICS
    • Trends & Industry Issues
    • Video Solutions
    • Access Control & Identification
    • Smart Home
    • More SDM Topics
  • COLUMNS
    • Editor's Angle
    • 5-Minute Tech Quiz
    • Security & the Law
    • Integration Spotlight
    • Security Networkings
    • Digital Shuffle
    • Technology @ Work
    • Insider News & Business
    • Technology Solutions & Skills
    • Marketing Madmen
    • Workforce Strategies
  • BLOG
  • EVENTS
    • Industry Calendar
    • SDM 100 Gala @ ESX
    • Webinars
  • MORE
    • Videos
    • Podcasts
    • Polls
    • Photo Galleries
    • Newsletters
    • Classified Ads
    • SDM Store
    • White Papers
    • Sponsor Insights
    • More Resources
  • BUYERS GUIDE
    • Buyers Guide
    • Take a Tour
    • SDM Buyers Guide eBook
  • INFOCENTERS
    • Helping Your Security Customers Rebound
Home » Store » Books » Physical Layer Security in Wireless Communications
Physical Layer.jpg

Physical Layer Security in Wireless Communications

$115.00
Books
No Comments

Product Details

Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels.

Written by pioneering researchers, Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks.

The book starts with a brief introduction to physical layer security. The rest of the book is organized into four parts based on the different approaches used for the design and analysis of physical layer security techniques:

 

 

  1. Information Theoretic Approaches: introduces capacity-achieving methods and coding schemes for secure communication, as well as secret key generation and agreement over wireless channels
  2. Signal Processing Approaches: covers recent progress in applying signal processing techniques to design physical layer security enhancements
  3. Game Theoretic Approaches: discusses the applications of game theory to analyze and design wireless networks with physical layer security considerations
  4. Graph Theoretic Approaches: presents the use of tools from graph theory and stochastic geometry to analyze and design large-scale wireless networks with physical layer security constraints

Presenting high-level discussions along with specific examples, illustrations, and references to conference and journal articles, this is an ideal reference for postgraduate students, researchers, and engineers that need to obtain a macro-level understanding of physical layer security and its role in future wireless communication systems. 

You must login or register in order to post a comment.

Report Abusive Comment

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest security marketplace trends.

SUBSCRIBE TODAY!
  • Resources
    • List Rental
    • Online Exclusives
    • Industry Innovations
    • Partners
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing