Buch, Englisch, 346 Seiten, Format (B × H): 175 mm x 250 mm, Gewicht: 777 g
ISBN: 978-0-521-51650-1
Verlag: Cambridge University Press
This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included.
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik
- Technische Wissenschaften Technik Allgemein Technische Zuverlässigkeit, Sicherheitstechnik
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
Weitere Infos & Material
Part I. Preliminaries: 1. An information-theoretic approach to physical-layer security
2. Fundamentals of information theory
Part II. Information-Theoretic Security: 3. Secrecy capacity
4. Secret-key capacity
5. Security limits of Gaussian and wireless channels
Part III. Coding and System Aspects: 6. Coding for secrecy
7. System aspects
Part IV. Other Applications of Information-Theoretic Security: 8. Secrecy and jamming in multi-user channels
8. Network coding security.




