Physical layer security in wireless communications
"Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Comparing to the cryptographic approaches, physical layer security is a fundamentally different paradigm, where secrecy is achieved by expl...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Boca Raton [u.a.]
CRC Press
2014
|
Schriftenreihe: | Wireless networks and mobile communications
20 |
Schlagworte: | |
Online-Zugang: | Cover image Inhaltsverzeichnis Klappentext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041656677 | ||
003 | DE-604 | ||
005 | 20220127 | ||
007 | t| | ||
008 | 140218s2014 xxu |||| 00||| eng d | ||
010 | |a 013026468 | ||
020 | |a 9781466567009 |9 978-1-4665-6700-9 | ||
035 | |a (OCoLC)864709518 | ||
035 | |a (DE-599)BVBBV041656677 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 | ||
050 | 0 | |a TK5103.2 | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Physical layer security in wireless communications |c ed. by Xiangyun Zhou ... |
264 | 1 | |a Boca Raton [u.a.] |b CRC Press |c 2014 | |
300 | |a XVII, 295 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Wireless networks and mobile communications |v 20 | |
520 | |a "Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Comparing to the cryptographic approaches, physical layer security is a fundamentally different paradigm, where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels. Written by pioneering researchers, this book provides a systematic overview of the foundations and recent developments of this promising security technology".. | ||
650 | 7 | |a TECHNOLOGY & ENGINEERING / Telecommunications |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications |2 bisacsh | |
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a TECHNOLOGY & ENGINEERING / Telecommunications | |
650 | 4 | |a TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications | |
650 | 0 | 7 | |a Funknetz |0 (DE-588)4216130-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Spieltheorie |0 (DE-588)4056243-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |D s |
689 | 0 | 1 | |a Funknetz |0 (DE-588)4216130-7 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 3 | |a Spieltheorie |0 (DE-588)4056243-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Zhou, Xiangyun |e Sonstige |0 (DE-588)1044693819 |4 oth | |
830 | 0 | |a Wireless networks and mobile communications |v 20 |w (DE-604)BV035470637 |9 20 | |
856 | 4 | |u http://images.tandf.co.uk/common/jackets/websmall/978146656/9781466567009.jpg |3 Cover image | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027097166&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027097166&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027097166 |
Datensatz im Suchindex
_version_ | 1819718055827079168 |
---|---|
adam_text | Contents
Preface
xi
Authors
xiii
Contributors
xv
1
Fundamentals of Physical Layer Security
1
1.1
Information-theoretic Secrecy
.......................... 2
1.1.1
Shannon s Cipher System and Perfect Secrecy
............. 2
1.1.2
Information-theoretic Secrecy Metrics
................. 3
1.2
Secret Communication over Noisy Channels
.................. 4
1.2.1
Wiretap Channel Model
......................... 4
1.2.2
Coding Mechanisms for Secret Communication
............ 6
1.3
Secret-key Generation from Noisy Channels
.................. 10
1.3.1
Channel Model for Secret-key Generation
............... 10
1.3.2
Coding Mechanisms for Secret-key Generation
............ 12
1.4
Conclusion
.................................... 13
References
........................................ 14
2
Coding for Wiretap Channels
17
2.1
Coding for the Wiretap Channel II
....................... 17
2.1.1
Basics of Error-Correcting Codes
.................... 18
2.1.2
Wiretap II Codes
............................. 20
2.2
Wiretap Coding with Polar Codes
....................... 23
2.2.1
Polar Codes
................................ 23
2.2.2
Polar Wiretap Codes
........................... 26
2.3
Coding for Gaussian Wiretap Channels
.................... 27
2.3.1
Error Probability and Secrecy Gain
.................. 27
2.3.2
Unimodular Lattice Codes
........................ 28
2.4
Conclusion
.................................... 31
Acknowledgment
.................................... 31
References
........................................ 31
3
LDPC Codes for the Gaussian Wiretap Channel
33
3.1
Channel Model and Basic Notions
....................... 33
3.2
Coding for Security
................................ 38
3.2.1
Asymptotic Analysis
........................... 38
3.2.2
Optimized Puncturing Distributions
.................. 40
3.2.3
Reducing
SNR
Loss
........................... 40
3.2.4
Finite Block Lengths
........................... 42
3.3
System
Aspects
.................................. 42
3.4
Concluding Remarks
............................... 44
References
........................................ 45
4
Key Generation from Wireless Channels
47
4.1
Introduction
.................................... 47
4.2
Information-theoretic Models for Key Generation
............... 49
4.2.1
Key Generation via Unlimited Public Discussion
........... 49
4.2.2
Key Generation with Rate Constraint in Public Discussion
..... 51
4.2.3
Key Generation with Side-information at Eve
............. 51
4.3
Basic Approaches for Key Generation via Wireless Networks
........ 52
4.4
A Joint Source-Channel Key Agreement Protocol
............... 54
4.4.1
Key Agreement with a Public Channel
................. 54
4.4.2
Key Agreement without a Public Channel
............... 56
4.5
Relay-assisted Key Generation with a Public Channel
............ 59
4.5.1
Relay-assisted Key Generation with One Relay
............ 59
4.5.2
Relay-assisted Key Generation with Multiple Relays
......... 61
4.5.3
Relay-oblivious Key Generation
..................... 62
4.6
Key Agreement with the Presence of an Active Attacker
........... 63
4.6.1
Training Phase
.............................. 63
4.6.2
Key Generation Phase
.......................... 65
4.7
Conclusion
.................................... 66
4.8
Acknowledgment
................................. 67
References
........................................ 67
5
Secrecy with Feedback
69
5.1
Introduction
.................................... 69
5.2
The Gaussian Two-way Wiretap Channel
................... 70
5.3
Achieving Secrecy Using Public Discussion
................... 71
5.4
Achieving Secrecy Using Cooperative Jamming
................ 73
5.4.1
Full-duplex Node
............................. 74
5.4.2
Half-duplex Node
............................. 74
5.5
Achieving Secrecy through Discussion and Jamming
............. 75
5.5.1
Jamming with Codewords
........................ 75
5.5.2
Secrecy through Key Generation
.................... 78
5.5.3
Block Markov Coding Scheme
...................... 80
5.6
When the Eavesdropper Channel States Are Not Known
........... 82
5.7
Converse
...................................... 84
5.7.1
Outer Bounds
............................... 84
5.7.2
Discussion
................................. 86
5.8
Conclusion
.................................... 87
5.9
Proof of Theorem
5.7.5.............................. 88
5.10
Proof of Theorem
5.7.6.............................. 89
References
........................................ 90
6
MIMO
Signal Processing Algorithms for Enhanced Physical
Layer Security
93
6.1
Introduction
.................................... 94
6.2
Physical Layer Security
............................. 94
6.2.1
Signal Processing Aspects
........................ 94
6.2.2
Secrecy Performance Metrics
...................... 95
6.2.3
The Role of CSI
............................. 95
6.3
MIMO
Wiretap Channels
............................ 96
6.3.1
Complete
CSI...............................
97
6.3.2
Partial
CSI................................
98
6.4
MIMO
Wiretap Channel with an External Helper
............... 99
6.5
MIMO
Broadcast Channel
............................ 101
6.6
MIMO
Interference Channel
........................... 103
6.7
MIMO
Relay Wiretap Networks
......................... 107
6.7.1
Relay-aided Cooperation
......................... 107
6.7.2
Untrusted Relaying
............................ 109
6.8
Conclusions
.................................... 110
References
........................................ 110
7
Discriminatory Channel Estimation for Secure Wireless
Communication
115
7.1
Introduction
.................................... 115
7.2
Discriminatory Channel Estimation
—
Basic Concept
............. 117
7.3
DCE via Feedback and Retraining
....................... 118
7.3.1
Two-Stage Feedback-and-Retraining
.................. 118
7.3.2
Multiple-stage Feedback and Retraining
................ 123
7.3.3
Simulation Results and Discussions
................... 124
7.4
Discriminatory Channel Estimation via Two-way Training
.......... 126
7.4.1
Two-way DCE Design for Reciprocal Channels
............ 126
7.4.2
Two-way DCE Design for Nonreciprocal Channels
.......... 129
7.4.3
Simulation Results and Discussions
................... 131
7.5
Conclusions and Discussions
........................... 134
Acknowledgment
.................................... 135
References
........................................ 135
8
Physical Layer Security in OFDM A Networks
137
8.1
Introduction
.................................... 137
8.2
Related Works on Secure OFDM/OFDM Networks
.............. 138
8.2.1
Secure OFDM Channel
......................... 138
8.2.2
Secure OFDMA Cellular Networks
................... 140
8.2.3
Secure OFDMA Relay Networks
.................... 140
8.2.4
Secure OFDM with Implementation Issues
............... 140
8.3
Basics of Resource Allocation for Secret Communications
.......... 141
8.3.1
Power Allocation Law for Secrecy
.................... 141
8.3.2
Multiple Eavesdroppers
......................... 141
8.4
Resource Allocation for Physical Layer Security in OFDMA Networks
. . . 142
8.4.1
Problem Formulation
.......................... 143
8.4.2
Optimal Policy
.............................. 144
8.4.3
Suboptimal
Algorithm
.......................... 146
8.4.4
Complexity
................................ 147
8.4.5
Numerical Examples
........................... 147
8.4.6
Discussion on False
CSI
Feedback
................... 149
8.5
Conclusions and Open Issues
.......................... 149
References
........................................ 150
9
The Application of Cooperative Transmissions to Secrecy
Communications
153
9.1
Introduction
.................................... 153
9.2
When All Nodes Are Equipped with a Single Antenna
............ 154
9.2.1
Cooperative Jamming
.......................... 155
9.2.2
Relay Chatting
.............................. 157
9.3
MIMO
Relay Secrecy Communication Scenarios
................ 163
9.3.1
When
CSI
of Eavesdroppers Is Known
................. 163
9.3.2
When
CSI
of Eavesdroppers Is Unknown
............... 168
9.4
Conclusion
.................................... 175
Acknowledgment
.................................... 175
References
........................................ 175
10
Game Theory for Physical Layer Security on Interference Channels
179
10.1
Introduction
.................................... 179
10.2
System Models and Scenarios
.......................... 181
10.2.1
Standard
MISO
Interference Channel
................. 182
10.2.2
MISO
Interference Channel with Private Messages
.......... 183
10.2.3
MISO
Interference Channel with Public Feedback and Private
Messages
................................. 185
10.2.4
Discussion and Comparison of Scenarios
................ 187
10.3
Noncooperative
Solutions
............................ 188
10.3.1
Noncooperative
Games in Strategic Form
............... 189
10.3.2
Solution for the
MISO
Interference Channel Scenarios
........ 191
10.4
Cooperative Solutions
.............................. 192
10.4.1
Bargaining Solutions
........................... 193
10.4.2
Nash Bargaining Solution
........................ 195
10.4.3
Bargaining Algorithm in the Edgeworth Box
............. 196
10.4.4
Walras Equilibrium Solution
...................... 196
10.5
Illustrations and Discussions
........................... 199
10.5.1
Comparison of Utility Regions
..................... 199
10.5.2
Noncooperative
and Cooperative Operating Points
.......... 200
10.5.3
Bargaining Algorithm Behavior
..................... 201
10.6
Conclusions
.................................... 202
Acknowledgment
.................................... 203
10.7
Appendix: Proofs
................................. 203
10.7.1
Proof of Theorem
10.3.1......................... 203
10.7.2
Proof of Theorem
10.4.1......................... 204
10.7.3
Proof of Theorem
10.4.2......................... 205
10.7.4
Proof of Theorem
10.4.3......................... 205
References
........................................ 206
11
Ascending Clock Auction for Physical Layer Security
209
11.1
Introduction
.................................... 210
11.1.1
Cooperative Jamming for Physical Layer Security
.......... 210
11.1.2
Game Theory-based Jamming Power Allocation
............ 211
11.1.3
Ascending Auctions
........................... 211
11.1.4
Chapter Outline
............................. 212
11.2
System Model and Problem Formulation
.................... 212
11.2.1
System Model
............................... 212
11.2.2
Source s Utility Function
........................ 214
11.2.3
Jammer s Utility Function
........................ 215
11.3
Auction-based Jamming Power Allocation Schemes
.............. 215
11.3.1
Power Allocation Scheme based on Single Object Pay-as-Bid
Ascending Clock Auction (P-ACA-S)
.................. 215
11.3.2
Power Allocation Scheme based on Traditional Ascending Clock
Auction (P-ACA-T)
........................... 216
11.3.3
Power Allocation Scheme based on Alternative Ascending Clock
Auction (P-ACA-A)
........................... 218
11.4
Properties of the Proposed Auction-based Power Allocation Schemes
.... 219
11.4.1
Optimal Jamming Power for Each Source
............... 220
11.4.2
Convergence
............................... 221
11.4.3
Cheat-proof
................................ 223
11.4.4
Social Welfare Maximization
...................... 226
11.4.5
Complexity and Overhead
........................ 229
11.5
Conclusions and Open Issues
.......................... 232
References
........................................ 234
12
Relay and Jammer Cooperation as a Coalitional Game
237
12.1
Introduction
.................................... 237
12.1.1
Cooperative Relaying and Cooperative Jamming
........... 237
12.1.2
Relay and Jammer Selection
...................... 238
12.1.3
Coalitional Game Theory
........................ 239
12.1.4
Chapter Outline
............................. 240
12.2
System Model and Problem Formulation
.................... 240
12.3
Relay and Jammer Cooperation as a Coalitional Game
............ 242
12.3.1
Coalitional Game Definition
....................... 242
12.3.2
Properties of the Proposed Coalitional Game
............. 244
12.4
Coalition Formation Algorithm
......................... 245
12.4.1
Coalition Formation Concepts
...................... 245
12.4.2
Merge-and-Split Coalition Formation Algorithm
........... 246
12.5
Conclusions and Open Issues
.......................... 248
References
........................................ 249
13
Stochastic Geometry Approaches to Secrecy in Large Wireless
Networks
253
13.1
Introduction
.................................... 253
13.1.1
Motivation
................................ 253
13.1.2
Stochastic Geometry Approaches
.................... 254
13.2
Secrecy Graph
.................................. 255
13.2.1
Network and Graph Model
....................... 255
13.2.2
Local Connectivity Properties
...................... 256
13.2.3
Global Connectivity Properties
..................... 258
13.2.4
Connectivity Enhancements
....................... 260
13.3
Secrecy Transmission Capacity
......................... 262
13.3.1
Network Model
.............................. 262
13.3.2
Capacity Formulation
.......................... 262
13.3.3
Illustrative Example
........................... 264
13.4
Current Limitations and Future Directions
................... 268
References
........................................ 269
14
Physical Layer Secrecy in Large Multihop Wireless Networks
271
14.1
Introduction
.................................... 271
14.2
Background: Physical Layer Security in One-hop Networks
.......... 273
14.3
Secure Connectivity: The Secrecy Graph
.................... 274
14.4
Secure Capacity
.................................. 275
14.4.1
Background: Throughput Scaling in Large Wireless Networks
.... 275
14.4.2
Secrecy Scaling with Known Eavesdropper Locations
......... 277
14.4.3
Secrecy Scaling with Unknown Eavesdropper Locations
....... 277
14.5
Conclusion and Future Work
.......................... 284
Acknowledgment
.................................... 285
References
........................................ 285
Index
289
Physical layer security has recently become an emerging technique to complement and
significantly improve the communication security of wireless networks. Compared
to cryptographic approaches, physical layer security is a fundamentally different
paradigm where secrecy is achieved by exploiting the physical layer properties of the
communication system, such as thermal noise, interference, and the time-varying nature
of fading channels.
Written by pioneeringresearchers^hysicalLayerSecurity in Wireless Communications
supplies a systematic overview of the basic concepts, recent advancements, and open
issues in providing communication security at the physical layer. It introduces the key
concepts, design issues, and solutions to physical layer security in single-user and multi¬
user communication systems, as well as large-scale wireless networks.
The book starts with a brief introduction to physical layer security. The rest of the book
is organized into four parts based on the different approaches used for the design and
analysis of physical layer security techniques:
1.
Information Theoretic Approaches: introduces capacity-achieving methods and
coding schemes for secure communication, as well as secret key generation and
agreement over wireless channels
2.
Signal Processing Approaches: covers recent progress in applying signal
processing techniques to design physical layer security enhancements
3.
Game Theoretic Approaches: discusses the applications of game theory to
analyze and design wireless networks with physical layer security considerations
4.
Graph Theoretic Approaches: presents the use of tools from graph theory and
stochastic geometry to analyze and design large-scale wireless networks with
physical layer security constraints
Presenting high-level discussions along with specific examples, illustrations, and
references to conference and journal articles, this is an ideal reference for postgraduate
students, researchers, and engineers that need to obtain a macro-level understanding of
physical layer security and its role in future wireless communication systems.
|
any_adam_object | 1 |
author_GND | (DE-588)1044693819 |
building | Verbundindex |
bvnumber | BV041656677 |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.2 |
callnumber-search | TK5103.2 |
callnumber-sort | TK 45103.2 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
ctrlnum | (OCoLC)864709518 (DE-599)BVBBV041656677 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03158nam a2200541 cb4500</leader><controlfield tag="001">BV041656677</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220127 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">140218s2014 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">013026468</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466567009</subfield><subfield code="9">978-1-4665-6700-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864709518</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041656677</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5103.2</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Physical layer security in wireless communications</subfield><subfield code="c">ed. by Xiangyun Zhou ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 295 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Wireless networks and mobile communications</subfield><subfield code="v">20</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Comparing to the cryptographic approaches, physical layer security is a fundamentally different paradigm, where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels. Written by pioneering researchers, this book provides a systematic overview of the foundations and recent developments of this promising security technology"..</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Telecommunications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY & ENGINEERING / Telecommunications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Xiangyun</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1044693819</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Wireless networks and mobile communications</subfield><subfield code="v">20</subfield><subfield code="w">(DE-604)BV035470637</subfield><subfield code="9">20</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://images.tandf.co.uk/common/jackets/websmall/978146656/9781466567009.jpg</subfield><subfield code="3">Cover image</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027097166&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027097166&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027097166</subfield></datafield></record></collection> |
id | DE-604.BV041656677 |
illustrated | Not Illustrated |
indexdate | 2024-12-24T04:01:49Z |
institution | BVB |
isbn | 9781466567009 |
language | English |
lccn | 013026468 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027097166 |
oclc_num | 864709518 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XVII, 295 S. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | CRC Press |
record_format | marc |
series | Wireless networks and mobile communications |
series2 | Wireless networks and mobile communications |
spellingShingle | Physical layer security in wireless communications Wireless networks and mobile communications TECHNOLOGY & ENGINEERING / Telecommunications bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Wireless communication systems Security measures TECHNOLOGY & ENGINEERING / Telecommunications TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications Funknetz (DE-588)4216130-7 gnd Spieltheorie (DE-588)4056243-8 gnd Kryptologie (DE-588)4033329-2 gnd Computerunterstützte Kommunikation (DE-588)4535905-2 gnd |
subject_GND | (DE-588)4216130-7 (DE-588)4056243-8 (DE-588)4033329-2 (DE-588)4535905-2 |
title | Physical layer security in wireless communications |
title_auth | Physical layer security in wireless communications |
title_exact_search | Physical layer security in wireless communications |
title_full | Physical layer security in wireless communications ed. by Xiangyun Zhou ... |
title_fullStr | Physical layer security in wireless communications ed. by Xiangyun Zhou ... |
title_full_unstemmed | Physical layer security in wireless communications ed. by Xiangyun Zhou ... |
title_short | Physical layer security in wireless communications |
title_sort | physical layer security in wireless communications |
topic | TECHNOLOGY & ENGINEERING / Telecommunications bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Wireless communication systems Security measures TECHNOLOGY & ENGINEERING / Telecommunications TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications Funknetz (DE-588)4216130-7 gnd Spieltheorie (DE-588)4056243-8 gnd Kryptologie (DE-588)4033329-2 gnd Computerunterstützte Kommunikation (DE-588)4535905-2 gnd |
topic_facet | TECHNOLOGY & ENGINEERING / Telecommunications TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications Wireless communication systems Security measures Funknetz Spieltheorie Kryptologie Computerunterstützte Kommunikation |
url | http://images.tandf.co.uk/common/jackets/websmall/978146656/9781466567009.jpg http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027097166&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027097166&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV035470637 |
work_keys_str_mv | AT zhouxiangyun physicallayersecurityinwirelesscommunications |