Trusted Communications with Physical Layer Security for 5G and Beyond

Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.

Saved in:
Bibliographic Details
Other Authors: Duong, Trung Q., (Editor), Zhou, Xiangyun, (Editor), Poor, H. Vincent, (Editor)
Format: eBook
Language: English
Published: London : Institution of Engineering and Technology, 2017.
Series: IET telecommunications series ; 76.
Subjects:
ISBN: 9781785612367
1785612360
9781523112906
1523112905
9781785612350
1785612352
Physical Description: 1 online resource : illustrations

Cover

Table of contents

LEADER 05412cam a2200505 i 4500
001 kn-on1011222244
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 171111s2017 enka ob 001 0 eng d
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d UAB  |d ITD  |d UIU  |d CDN  |d IDEBK  |d OCLCO  |d MERUC  |d OCLCF  |d N$T  |d KNOVL  |d YDX  |d STF  |d EZ9  |d OTZ  |d OCLCQ  |d WYU  |d LVT  |d G3B  |d IGB  |d CUV  |d UKAHL  |d OCLCQ  |d OCL  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9781785612367  |q (electronic bk.) 
020 |a 1785612360  |q (electronic bk.) 
020 |a 9781523112906  |q (electronic bk.) 
020 |a 1523112905  |q (electronic bk.) 
020 |z 9781785612350 
020 |z 1785612352 
035 |a (OCoLC)1011222244  |z (OCoLC)1008972587  |z (OCoLC)1057437076  |z (OCoLC)1097126446 
245 0 0 |a Trusted Communications with Physical Layer Security for 5G and Beyond /  |c edited by Trung Q. Duong, Xiangyun Zhou and H. Vincent Poor. 
264 1 |a London :  |b Institution of Engineering and Technology,  |c 2017. 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IET Telecommunications Series ;  |v 76 
504 |a Includes bibliographical references and index. 
505 0 |a Contents -- About the editors -- Preface -- Part I: Fundamentals of physical layer security -- 1. Secrecy metrics for physical layer security over fading channels / Biao He, Vincent K.N. Lau, Xiangyun Zhou, and A. Lee Swindlehurst -- 2. Secure data networks with channel uncertainty / Amal Hyadi, Zouheir Rezki, and Mohamed-Slim Alouini -- 3. Confidential and energy-efficient communications by physical layer security / Alessio Zappone, Pin-Hsun Lin, and Eduard A. Jorswieck -- Part II: Physical layer security for multiple-antenna technologies 
505 8 |a 4. Antenna selection strategies for wiretap channels / Shihao Yan, Nan Yang, Robert Malaney, and Jinhong Yuan5. Physical layer security for massive MIMO systems / Jun Zhu, Robert Schober, and Vijay K. Bhargava -- 6. Physical layer security for massive MIMO with anti-jamming / Tan Tai Do, Hien Quoc Ngo, and Trung Q. Duong -- 7. Physical layer security for multiuser relay networks / Lisheng Fan and Trung Q. Duong -- 8. Trusted wireless communications with spatial multiplexing / Giovanni Geraci and Jinhong Yuan -- Part III: Physical layer security with emerging 5G technologies 
505 8 |a 9. Physical layer security for wirelessly powered communication systems / Caijun Zhong and Xiaoming Chen10. Physical layer security for D2D-enabled cellular networks / Chuan Ma, Jianting Yue, Hui Yu, and Xiaoying Gan -- 11. Physical layer security for cognitive radio networks / Van-Dinh Nguyen, Trung Q. Duong, and Oh-Soon Shin -- 12. Physical layer security in mmWave cellular networks / Hui-MingWang -- Part IV: Physical layer security with emerging modulation technologies -- 13. Directional-modulation-enabled physical-layer wireless security / Yuan Ding and Vincent Fusco 
505 8 |a 14. Secure waveforms for 5G systems / Stefano Tomasin15. Physical layer security in non-orthogonal multiple access / Hui-Ming Wang, Yi Zhang, and Zhiguo Ding -- 16. Physical layer security for MIMOME-OFDM systems: spatial versus temporal artificial noise / Ahmed El Shafie, Zhiguo Ding, and Naofal Al-Dhahir -- Part V: Applications of physical layer security -- 17. Physical layer security for real-world applications: use cases, results and open challenges / Stephan Ludwig, René Guillaume, and Andreas MÃơller 
505 8 |a ""18. Key generation from wireless channels: a survey and practical implementation / Junqing Zhang, Trung Q. Duong, RogerWoods, and Alan Marshall""""19. Application cases of secret key generation in communication nodes and terminals / Christiane Kameni Ngassa, Taghrid Mazloum, FranÃois Delaveau, Sandrine Boumard, Nir Shapira, Renaud MoliÃr̈e, Alain Sibille, Adrian Kotelba, and Jani Suomalainen"" 
505 8 |a ""20. Application cases of secrecy coding in communication nodes and terminals / Christiane Kameni Ngassa, Cong Ling, FranÃois Delaveau, Sandrine Boumard, Nir Shapira, Ling Liu, Renaud MoliÃr̈e, Adrian Kotelba, and Jani Suomalainen"" 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Wireless communication systems  |x Security measures. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Duong, Trung Q.,  |e editor. 
700 1 |a Zhou, Xiangyun,  |e editor. 
700 1 |a Poor, H. Vincent,  |e editor. 
776 0 8 |i Print version:  |t Trusted communications with physical layer security for 5G and beyond.  |d London, United Kingdom : The Institution of Engineering and Technology, 2017  |z 9781785612350  |w (DLC) 2018300258  |w (OCoLC)988170893 
830 0 |a IET telecommunications series ;  |v 76. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpTCPLSGB2/trusted-communications-with?kpromoter=marc  |y Full text