Trusted Communications with Physical Layer Security for 5G and Beyond
Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.
Saved in:
| Other Authors | , , |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
London :
Institution of Engineering and Technology,
2017.
|
| Series | IET telecommunications series ;
76. |
| Subjects | |
| Online Access | Full text |
| ISBN | 9781785612367 1785612360 9781523112906 1523112905 9781785612350 1785612352 |
| Physical Description | 1 online resource : illustrations |
Cover
| LEADER | 00000cam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | kn-on1011222244 | ||
| 003 | OCoLC | ||
| 005 | 20240717213016.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 171111s2017 enka ob 001 0 eng d | ||
| 040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d UAB |d ITD |d UIU |d CDN |d IDEBK |d OCLCO |d MERUC |d OCLCF |d N$T |d KNOVL |d YDX |d STF |d EZ9 |d OTZ |d OCLCQ |d WYU |d LVT |d G3B |d IGB |d CUV |d UKAHL |d OCLCQ |d OCL |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
| 020 | |a 9781785612367 |q (electronic bk.) | ||
| 020 | |a 1785612360 |q (electronic bk.) | ||
| 020 | |a 9781523112906 |q (electronic bk.) | ||
| 020 | |a 1523112905 |q (electronic bk.) | ||
| 020 | |z 9781785612350 | ||
| 020 | |z 1785612352 | ||
| 035 | |a (OCoLC)1011222244 |z (OCoLC)1008972587 |z (OCoLC)1057437076 |z (OCoLC)1097126446 | ||
| 245 | 0 | 0 | |a Trusted Communications with Physical Layer Security for 5G and Beyond / |c edited by Trung Q. Duong, Xiangyun Zhou and H. Vincent Poor. |
| 264 | 1 | |a London : |b Institution of Engineering and Technology, |c 2017. | |
| 300 | |a 1 online resource : |b illustrations | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 490 | 1 | |a IET Telecommunications Series ; |v 76 | |
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Contents -- About the editors -- Preface -- Part I: Fundamentals of physical layer security -- 1. Secrecy metrics for physical layer security over fading channels / Biao He, Vincent K.N. Lau, Xiangyun Zhou, and A. Lee Swindlehurst -- 2. Secure data networks with channel uncertainty / Amal Hyadi, Zouheir Rezki, and Mohamed-Slim Alouini -- 3. Confidential and energy-efficient communications by physical layer security / Alessio Zappone, Pin-Hsun Lin, and Eduard A. Jorswieck -- Part II: Physical layer security for multiple-antenna technologies | |
| 505 | 8 | |a 4. Antenna selection strategies for wiretap channels / Shihao Yan, Nan Yang, Robert Malaney, and Jinhong Yuan5. Physical layer security for massive MIMO systems / Jun Zhu, Robert Schober, and Vijay K. Bhargava -- 6. Physical layer security for massive MIMO with anti-jamming / Tan Tai Do, Hien Quoc Ngo, and Trung Q. Duong -- 7. Physical layer security for multiuser relay networks / Lisheng Fan and Trung Q. Duong -- 8. Trusted wireless communications with spatial multiplexing / Giovanni Geraci and Jinhong Yuan -- Part III: Physical layer security with emerging 5G technologies | |
| 505 | 8 | |a 9. Physical layer security for wirelessly powered communication systems / Caijun Zhong and Xiaoming Chen10. Physical layer security for D2D-enabled cellular networks / Chuan Ma, Jianting Yue, Hui Yu, and Xiaoying Gan -- 11. Physical layer security for cognitive radio networks / Van-Dinh Nguyen, Trung Q. Duong, and Oh-Soon Shin -- 12. Physical layer security in mmWave cellular networks / Hui-MingWang -- Part IV: Physical layer security with emerging modulation technologies -- 13. Directional-modulation-enabled physical-layer wireless security / Yuan Ding and Vincent Fusco | |
| 505 | 8 | |a 14. Secure waveforms for 5G systems / Stefano Tomasin15. Physical layer security in non-orthogonal multiple access / Hui-Ming Wang, Yi Zhang, and Zhiguo Ding -- 16. Physical layer security for MIMOME-OFDM systems: spatial versus temporal artificial noise / Ahmed El Shafie, Zhiguo Ding, and Naofal Al-Dhahir -- Part V: Applications of physical layer security -- 17. Physical layer security for real-world applications: use cases, results and open challenges / Stephan Ludwig, René Guillaume, and Andreas MÃơller | |
| 505 | 8 | |a ""18. Key generation from wireless channels: a survey and practical implementation / Junqing Zhang, Trung Q. Duong, RogerWoods, and Alan Marshall""""19. Application cases of secret key generation in communication nodes and terminals / Christiane Kameni Ngassa, Taghrid Mazloum, FranÃois Delaveau, Sandrine Boumard, Nir Shapira, Renaud MoliÃr̈e, Alain Sibille, Adrian Kotelba, and Jani Suomalainen"" | |
| 505 | 8 | |a ""20. Application cases of secrecy coding in communication nodes and terminals / Christiane Kameni Ngassa, Cong Ling, FranÃois Delaveau, Sandrine Boumard, Nir Shapira, Ling Liu, Renaud MoliÃr̈e, Adrian Kotelba, and Jani Suomalainen"" | |
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques. | ||
| 590 | |a Knovel |b Knovel (All titles) | ||
| 650 | 0 | |a Wireless communication systems |x Security measures. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Duong, Trung Q., |e editor. | |
| 700 | 1 | |a Zhou, Xiangyun, |e editor. | |
| 700 | 1 | |a Poor, H. Vincent, |e editor. | |
| 776 | 0 | 8 | |i Print version: |t Trusted communications with physical layer security for 5G and beyond. |d London, United Kingdom : The Institution of Engineering and Technology, 2017 |z 9781785612350 |w (DLC) 2018300258 |w (OCoLC)988170893 |
| 830 | 0 | |a IET telecommunications series ; |v 76. | |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpTCPLSGB2/trusted-communications-with?kpromoter=marc |y Full text |