Trusted Communications with Physical Layer Security for 5G and Beyond
Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.
Saved in:
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
London :
Institution of Engineering and Technology,
2017.
|
Series: | IET telecommunications series ;
76. |
Subjects: | |
ISBN: | 9781785612367 1785612360 9781523112906 1523112905 9781785612350 1785612352 |
Physical Description: | 1 online resource : illustrations |
LEADER | 05412cam a2200505 i 4500 | ||
---|---|---|---|
001 | kn-on1011222244 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 171111s2017 enka ob 001 0 eng d | ||
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d UAB |d ITD |d UIU |d CDN |d IDEBK |d OCLCO |d MERUC |d OCLCF |d N$T |d KNOVL |d YDX |d STF |d EZ9 |d OTZ |d OCLCQ |d WYU |d LVT |d G3B |d IGB |d CUV |d UKAHL |d OCLCQ |d OCL |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 9781785612367 |q (electronic bk.) | ||
020 | |a 1785612360 |q (electronic bk.) | ||
020 | |a 9781523112906 |q (electronic bk.) | ||
020 | |a 1523112905 |q (electronic bk.) | ||
020 | |z 9781785612350 | ||
020 | |z 1785612352 | ||
035 | |a (OCoLC)1011222244 |z (OCoLC)1008972587 |z (OCoLC)1057437076 |z (OCoLC)1097126446 | ||
245 | 0 | 0 | |a Trusted Communications with Physical Layer Security for 5G and Beyond / |c edited by Trung Q. Duong, Xiangyun Zhou and H. Vincent Poor. |
264 | 1 | |a London : |b Institution of Engineering and Technology, |c 2017. | |
300 | |a 1 online resource : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a IET Telecommunications Series ; |v 76 | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Contents -- About the editors -- Preface -- Part I: Fundamentals of physical layer security -- 1. Secrecy metrics for physical layer security over fading channels / Biao He, Vincent K.N. Lau, Xiangyun Zhou, and A. Lee Swindlehurst -- 2. Secure data networks with channel uncertainty / Amal Hyadi, Zouheir Rezki, and Mohamed-Slim Alouini -- 3. Confidential and energy-efficient communications by physical layer security / Alessio Zappone, Pin-Hsun Lin, and Eduard A. Jorswieck -- Part II: Physical layer security for multiple-antenna technologies | |
505 | 8 | |a 4. Antenna selection strategies for wiretap channels / Shihao Yan, Nan Yang, Robert Malaney, and Jinhong Yuan5. Physical layer security for massive MIMO systems / Jun Zhu, Robert Schober, and Vijay K. Bhargava -- 6. Physical layer security for massive MIMO with anti-jamming / Tan Tai Do, Hien Quoc Ngo, and Trung Q. Duong -- 7. Physical layer security for multiuser relay networks / Lisheng Fan and Trung Q. Duong -- 8. Trusted wireless communications with spatial multiplexing / Giovanni Geraci and Jinhong Yuan -- Part III: Physical layer security with emerging 5G technologies | |
505 | 8 | |a 9. Physical layer security for wirelessly powered communication systems / Caijun Zhong and Xiaoming Chen10. Physical layer security for D2D-enabled cellular networks / Chuan Ma, Jianting Yue, Hui Yu, and Xiaoying Gan -- 11. Physical layer security for cognitive radio networks / Van-Dinh Nguyen, Trung Q. Duong, and Oh-Soon Shin -- 12. Physical layer security in mmWave cellular networks / Hui-MingWang -- Part IV: Physical layer security with emerging modulation technologies -- 13. Directional-modulation-enabled physical-layer wireless security / Yuan Ding and Vincent Fusco | |
505 | 8 | |a 14. Secure waveforms for 5G systems / Stefano Tomasin15. Physical layer security in non-orthogonal multiple access / Hui-Ming Wang, Yi Zhang, and Zhiguo Ding -- 16. Physical layer security for MIMOME-OFDM systems: spatial versus temporal artificial noise / Ahmed El Shafie, Zhiguo Ding, and Naofal Al-Dhahir -- Part V: Applications of physical layer security -- 17. Physical layer security for real-world applications: use cases, results and open challenges / Stephan Ludwig, René Guillaume, and Andreas MÃơller | |
505 | 8 | |a ""18. Key generation from wireless channels: a survey and practical implementation / Junqing Zhang, Trung Q. Duong, RogerWoods, and Alan Marshall""""19. Application cases of secret key generation in communication nodes and terminals / Christiane Kameni Ngassa, Taghrid Mazloum, FranÃois Delaveau, Sandrine Boumard, Nir Shapira, Renaud MoliÃr̈e, Alain Sibille, Adrian Kotelba, and Jani Suomalainen"" | |
505 | 8 | |a ""20. Application cases of secrecy coding in communication nodes and terminals / Christiane Kameni Ngassa, Cong Ling, FranÃois Delaveau, Sandrine Boumard, Nir Shapira, Ling Liu, Renaud MoliÃr̈e, Adrian Kotelba, and Jani Suomalainen"" | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques. | ||
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Wireless communication systems |x Security measures. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Duong, Trung Q., |e editor. | |
700 | 1 | |a Zhou, Xiangyun, |e editor. | |
700 | 1 | |a Poor, H. Vincent, |e editor. | |
776 | 0 | 8 | |i Print version: |t Trusted communications with physical layer security for 5G and beyond. |d London, United Kingdom : The Institution of Engineering and Technology, 2017 |z 9781785612350 |w (DLC) 2018300258 |w (OCoLC)988170893 |
830 | 0 | |a IET telecommunications series ; |v 76. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpTCPLSGB2/trusted-communications-with?kpromoter=marc |y Full text |