Securing Wireless Communications at the Physical Layer:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA
Springer US
2010
|
Schlagworte: | |
Online-Zugang: | BTU01 FHI01 FHN01 FHR01 Volltext |
Beschreibung: | Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer. Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored. Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781441913852 |
DOI: | 10.1007/978-1-4419-1385-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV041889586 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 140603s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781441913852 |c Online |9 978-1-4419-1385-2 | ||
024 | 7 | |a 10.1007/978-1-4419-1385-2 |2 doi | |
035 | |a (OCoLC)881672803 | ||
035 | |a (DE-599)BVBBV041889586 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-898 |a DE-573 |a DE-92 |a DE-83 | ||
082 | 0 | |a 621.382 |2 23 | |
100 | 1 | |a Liu, Ruoheng |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing Wireless Communications at the Physical Layer |c edited by Ruoheng Liu, Wade Trappe |
264 | 1 | |a Boston, MA |b Springer US |c 2010 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer. Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored. Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications | ||
505 | 0 | |a Secrecy Capacity of Independent Parallel Channels -- Obtaining Secrecy through Intentional Uncertainty -- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel -- Cooperative Jamming: The Tale of Friendly Interference for Secrecy -- Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications -- Secret Communication Under Channel Uncertainty -- Cooperative Secrecy in Wireless Communications -- Source Coding under Secrecy Constraints -- Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels -- Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems -- Secret Key Agreement Techniques based on Multipath Propagation Characteristics -- Secret Communication over Fading Channels -- Fingerprints in the Ether: Channel-Based Authentication -- Message Authentication: Information Theoretic Bounds -- Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement -- Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels | |
650 | 4 | |a Engineering | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Signal, Image and Speech Processing | |
650 | 4 | |a Data Structures, Cryptology and Information Theory | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Ingenieurwissenschaften | |
700 | 1 | |a Trappe, Wade |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4419-1384-5 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4419-1385-2 |x Verlag |3 Volltext |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027333539 | ||
966 | e | |u https://doi.org/10.1007/978-1-4419-1385-2 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4419-1385-2 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4419-1385-2 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4419-1385-2 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152238569947136 |
---|---|
any_adam_object | |
author | Liu, Ruoheng |
author_facet | Liu, Ruoheng |
author_role | aut |
author_sort | Liu, Ruoheng |
author_variant | r l rl |
building | Verbundindex |
bvnumber | BV041889586 |
collection | ZDB-2-ENG |
contents | Secrecy Capacity of Independent Parallel Channels -- Obtaining Secrecy through Intentional Uncertainty -- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel -- Cooperative Jamming: The Tale of Friendly Interference for Secrecy -- Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications -- Secret Communication Under Channel Uncertainty -- Cooperative Secrecy in Wireless Communications -- Source Coding under Secrecy Constraints -- Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels -- Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems -- Secret Key Agreement Techniques based on Multipath Propagation Characteristics -- Secret Communication over Fading Channels -- Fingerprints in the Ether: Channel-Based Authentication -- Message Authentication: Information Theoretic Bounds -- Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement -- Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels |
ctrlnum | (OCoLC)881672803 (DE-599)BVBBV041889586 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-1-4419-1385-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04876nmm a2200505zc 4500</leader><controlfield tag="001">BV041889586</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140603s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781441913852</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4419-1385-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4419-1385-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881672803</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041889586</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Liu, Ruoheng</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing Wireless Communications at the Physical Layer</subfield><subfield code="c">edited by Ruoheng Liu, Wade Trappe</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Springer US</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer. Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored. Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Secrecy Capacity of Independent Parallel Channels -- Obtaining Secrecy through Intentional Uncertainty -- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel -- Cooperative Jamming: The Tale of Friendly Interference for Secrecy -- Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications -- Secret Communication Under Channel Uncertainty -- Cooperative Secrecy in Wireless Communications -- Source Coding under Secrecy Constraints -- Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels -- Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems -- Secret Key Agreement Techniques based on Multipath Propagation Characteristics -- Secret Communication over Fading Channels -- Fingerprints in the Ether: Channel-Based Authentication -- Message Authentication: Information Theoretic Bounds -- Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement -- Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Signal, Image and Speech Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures, Cryptology and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Trappe, Wade</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4419-1384-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4419-1385-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027333539</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4419-1385-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4419-1385-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4419-1385-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4419-1385-2</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041889586 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:07:32Z |
institution | BVB |
isbn | 9781441913852 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027333539 |
oclc_num | 881672803 |
open_access_boolean | |
owner | DE-634 DE-898 DE-BY-UBR DE-573 DE-92 DE-83 |
owner_facet | DE-634 DE-898 DE-BY-UBR DE-573 DE-92 DE-83 |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer US |
record_format | marc |
spelling | Liu, Ruoheng Verfasser aut Securing Wireless Communications at the Physical Layer edited by Ruoheng Liu, Wade Trappe Boston, MA Springer US 2010 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer. Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored. Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications Secrecy Capacity of Independent Parallel Channels -- Obtaining Secrecy through Intentional Uncertainty -- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel -- Cooperative Jamming: The Tale of Friendly Interference for Secrecy -- Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications -- Secret Communication Under Channel Uncertainty -- Cooperative Secrecy in Wireless Communications -- Source Coding under Secrecy Constraints -- Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels -- Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems -- Secret Key Agreement Techniques based on Multipath Propagation Characteristics -- Secret Communication over Fading Channels -- Fingerprints in the Ether: Channel-Based Authentication -- Message Authentication: Information Theoretic Bounds -- Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement -- Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels Engineering Data structures (Computer science) Data encryption (Computer science) Telecommunication Communications Engineering, Networks Signal, Image and Speech Processing Data Structures, Cryptology and Information Theory Data Encryption Ingenieurwissenschaften Trappe, Wade Sonstige oth Erscheint auch als Druckausgabe 978-1-4419-1384-5 https://doi.org/10.1007/978-1-4419-1385-2 Verlag Volltext |
spellingShingle | Liu, Ruoheng Securing Wireless Communications at the Physical Layer Secrecy Capacity of Independent Parallel Channels -- Obtaining Secrecy through Intentional Uncertainty -- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel -- Cooperative Jamming: The Tale of Friendly Interference for Secrecy -- Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications -- Secret Communication Under Channel Uncertainty -- Cooperative Secrecy in Wireless Communications -- Source Coding under Secrecy Constraints -- Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels -- Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems -- Secret Key Agreement Techniques based on Multipath Propagation Characteristics -- Secret Communication over Fading Channels -- Fingerprints in the Ether: Channel-Based Authentication -- Message Authentication: Information Theoretic Bounds -- Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement -- Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels Engineering Data structures (Computer science) Data encryption (Computer science) Telecommunication Communications Engineering, Networks Signal, Image and Speech Processing Data Structures, Cryptology and Information Theory Data Encryption Ingenieurwissenschaften |
title | Securing Wireless Communications at the Physical Layer |
title_auth | Securing Wireless Communications at the Physical Layer |
title_exact_search | Securing Wireless Communications at the Physical Layer |
title_full | Securing Wireless Communications at the Physical Layer edited by Ruoheng Liu, Wade Trappe |
title_fullStr | Securing Wireless Communications at the Physical Layer edited by Ruoheng Liu, Wade Trappe |
title_full_unstemmed | Securing Wireless Communications at the Physical Layer edited by Ruoheng Liu, Wade Trappe |
title_short | Securing Wireless Communications at the Physical Layer |
title_sort | securing wireless communications at the physical layer |
topic | Engineering Data structures (Computer science) Data encryption (Computer science) Telecommunication Communications Engineering, Networks Signal, Image and Speech Processing Data Structures, Cryptology and Information Theory Data Encryption Ingenieurwissenschaften |
topic_facet | Engineering Data structures (Computer science) Data encryption (Computer science) Telecommunication Communications Engineering, Networks Signal, Image and Speech Processing Data Structures, Cryptology and Information Theory Data Encryption Ingenieurwissenschaften |
url | https://doi.org/10.1007/978-1-4419-1385-2 |
work_keys_str_mv | AT liuruoheng securingwirelesscommunicationsatthephysicallayer AT trappewade securingwirelesscommunicationsatthephysicallayer |