|
马上注册,结交更多好友,享用更多功能,让你轻松玩转社区。
您需要 登录 才可以下载或查看,没有账号?注册
x
本帖最后由 fwbnick 于 2014-6-8 21:23 编辑
Physical Layer Approaches for Securing Wireless Communication Systems
This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated. Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach using redundant antennas of MIMO systems to provide stronger security for wireless networks. The channel responses between communication peers have been explored as a form of fingerprint with spatial and temporal uniqueness. Finally, the book develops a new lightweight method of channel identification for Sybil attack and node clone detection in wireless sensor networks (WSNs). | Table of contents :
Content:
Front Matter....Pages i-x
Introduction for PHY Security....Pages 1-4
Unconditional Security Wireless Communication....Pages 5-22
MIMO Based Enhancement for Wireless Communication Security....Pages 23-36
Physical Layer Assisted Authentication for Wireless Sensor Networks....Pages 37-57
Detection of Node Clone and Sybil Attack Based on CI Approach....Pages 59-78
Back Matter....Pages 79-83
Physical Layer Approaches for Securing Wireless Communication Systems.pdf
(4.21 MB, 下载次数: 474 )
Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems
This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping. While most articles on physical layer secrecy focus on the information-theoretic aspect, we focus specifically on the signal processing aspects, including beamforming and precoding techniques for data transmission and discriminatory training schemes for channel estimation. The discussions will cover cases with collocated and with distributed antennas, i.e., relays. The topics covered will be of interest to researchers in the signal processing community as well to practitioners and engineers working in this area. This book will also review recent works that apply these signal processing approaches to more advanced wireless systems, such as OFDM systems, multicell systems, cognitive radio, multihop networks etc. This will draw interest from researchers that wish to pursue the topic further in these new directions.
| Table of contents :
Content:
Front Matter....Pages i-xii
Introduction....Pages 1-9
Background on Information-Theoretic Physical Layer Secrecy....Pages 11-28
Secrecy Precoding and Beamforming in Multi-Antenna Wireless Systems....Pages 29-60
Distributed Secrecy Beamforming and Precoding in Multi-Antenna Wireless Relay Systems....Pages 61-95
Secrecy-Enhancing Channel Estimation in Multi-Antenna Wireless Systems....Pages 97-123
Enhancing Physical-Layer Secrecy in Modern Wireless Communication Systems....Pages 125-132
Back Matter....Pages 133-135
Signal Processing Approaches to Secure Physical Layer Communications.pdf
(3.54 MB, 下载次数: 641 )
Security in Wireless Mesh Networks (CRC Press,2008)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.
Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and prevention, secure routing, and security policies. The book also examines security mechanisms in IEEE 802.11, IEEE 802.15, IEEE 802.16, and IEEE 802.20 standards. In addition, it provides numerous case studies and applications to facilitate understanding.
As a single, comprehensive guide to security-related issues in WMN, this book is an important resource to have if you are working on the design, selection, and implementation of wireless mesh networks and system components.
Security in Wireless Mesh Networks.pdf
(10.05 MB, 下载次数: 840 )
Securing Wireless Communications at the Physical Layer (Springer 2009)
The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods described in this book secure communications at the physical layer.
The area of physical layer security is an emerging field of research that has seen an explosion of research in the past few years. This trend is only expected to continue as there is a growing need to secure wireless communications without conventional cryptographic network security protocols.
The proposed book will consist of contributions from roughly a dozen of the leading research groups in this emerging area. For the first time, important results will be collected together. Important topics will include the secrecy rate of MIMO wireless systems, practical codes for the dissemination of secrets, and authentication of wireless transmitters using waveform-level properties.
Securing Wireless Communications at the Physical Layer.pdf
(7.14 MB, 下载次数: 676 )
|
|
|
|