Suchen und Finden

Titel

Autor

Inhaltsverzeichnis

Nur ebooks mit Firmenlizenz anzeigen:

 

Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach

Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach

Yulong Shen, Yuanyu Zhang, Xiaohong Jiang

 

Verlag Springer-Verlag, 2023

ISBN 9783031384653 , 360 Seiten

Format PDF

Kopierschutz Wasserzeichen

Geräte

181,89 EUR

Mehr zum Inhalt

Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach


 

This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems. In particular, this book covers three security aspects of wireless communications. It includes secrecy, i.e., preventing eavesdroppers from intercepting information from transmitted wireless signals, covertness, i.e., hiding the transmitted signals themselves from malicious wardens and authentication, i.e., authenticating the identities of communicating entities. 
When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming.  Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems based on channel features and/or radiometric features of transceivers. In addition, this book  presents security-aware routing in wireless networks based on physical layer secure communication techniques.
This book targets researchers in the fields of physical layer security and wireless communications security. Advanced-level students in electronic engineering or computer science studying these security topics will also want to purchase this book as a secondary textbook.


Yulong Shen received the B.S. and M.S. degrees in computer science and the Ph.D. degree in cryptography from Xidian University, Xi'an, China, in 2002, 2005, and 2008, respectively. He is currently a Professor at the School of Computer Science and Technology, Xidian University, where he is also an Associate Director of the Shaanxi Key Laboratory of Network and System Security and a member of the State Key Laboratory of Integrated Services Networks. His research interests include wireless network security and cloud computing security. He has also served on the technical program committees of several international conferences, including ICEBE, INCoS, CIS, and SOWN. 

Yuanyu Zhang received the B.S. and M.S. degrees from Xidian University, Xi'an, China, in 2011 and 2014, respectively, and the Ph.D. degree from Future University Hakodate, Hakodate, Hokkaido, Japan, in 2017. He is currently an Associate Professor at the School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi, China. Prior to joining Xidian University, he was an Assistant Professor at the Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Japan. His research interests include Satellite Internet security, physical layer authentication, and physical layer security of wireless communications. 

Xiaohong Jiang received his B.S., M.S. and Ph.D. degrees in 1989, 1992, and 1999 respectively, all from Xidian University, China. He is currently a full professor at Future University Hakodate, Japan. Before joining Future University, Dr. Jiang was an Associate professor, at Tohoku University, from Feb. 2005 to Mar. 2010. His research interests include computer communications networks, mainly wireless networks and optical networks, network security, routers/switches design, etc. He has published over 300 technical papers at premium international journals and conferences, which include over 70 papers published in top IEEE journals and top IEEE conferences, like IEEE/ACM Transactions on Networking, IEEE Journal of Selected Areas on Communications, IEEE Transactions on Parallel and Distributed Systems, IEEE INFOCOM