Download Physical Layer Approaches for Securing Wireless by Hong Wen PDF

By Hong Wen

This publication surveys the exceptional paintings of physical-layer (PHY) safety, together with  the new achievements of confidentiality and authentication for instant verbal exchange structures by means of channel identity. a realistic method of construction unconditional confidentiality for instant verbal exchange protection by means of suggestions and mistake correcting code is brought and a framework of PHY safeguard in line with house time block code (STBC) MIMO process is demonstrated.  additionally mentioned is a scheme which mixes cryptographic innovations applied within the better layer with the actual layer protection technique utilizing redundant antennas of MIMO structures to supply enhanced safeguard for instant networks. The channel responses among communique friends were explored as a sort of fingerprint with spatial and temporal forte. ultimately, the ebook develops a brand new light-weight approach to channel identity for Sybil assault and node clone detection in instant sensor networks (WSNs).

Show description

Read or Download Physical Layer Approaches for Securing Wireless Communication Systems (SpringerBriefs in Computer Science) PDF

Best internet & networking books

Grid Computing Security

In line with learn and adventure, this booklet buildings the problems bearing on grid computing protection into 3 major different types: architecture-related, infrastructure-related, and management-related matters. It discusses all 3 different types intimately, offers latest ideas, criteria, and items, and pinpoints their shortcomings and open questions.

Routing, Flow, and Capacity Design in Communication and Computer Networks (The Morgan Kaufmann Series in Networking)

In community layout, the space among idea and perform is woefully vast. This publication narrows it, comprehensively and severely interpreting present community layout types and strategies. you'll research the place mathematical modeling and algorithmic optimization were under-utilized. on the contrary severe, you are going to research the place they generally tend to fail to give a contribution to the dual targets of community potency and cost-savings.

Frontier and Innovation in Future Computing and Communications (Lecture Notes in Electrical Engineering)

IT know-how engineering alterations lifestyle, particularly in Computing and Communications. The objective of this booklet is to additional discover the theoretical and functional problems with destiny Computing and Communications. It additionally goals to foster new principles and collaboration among researchers and practitioners.

Trustworthy Computing and Services: International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers (Communications in Computer and Information Science)

This booklet constitutes the refereed lawsuits of the foreign regular convention on reliable dispensed Computing and providers, ISCTCS 2013, held in Beijing, China, in November 2013. The forty nine revised complete papers awarded have been conscientiously reviewed and chosen from 267 papers. the themes coated are reliable infrastructure; defense, survivability and fault tolerance; criteria, review and certification; trustworthiness of companies.

Additional info for Physical Layer Approaches for Securing Wireless Communication Systems (SpringerBriefs in Computer Science)

Sample text

Download PDF sample

Rated 4.13 of 5 – based on 11 votes