Physical layer security in wireless communications

"Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Comparing to the cryptographic approaches, physical layer security is a fundamentally different paradigm, where secrecy is achieved by expl...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Format: Buch
Sprache:English
Veröffentlicht: Boca Raton [u.a.] CRC Press 2014
Schriftenreihe:Wireless networks and mobile communications 20
Schlagworte:
Online-Zugang:Cover image
Inhaltsverzeichnis
Klappentext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV041656677
003 DE-604
005 20220127
007 t|
008 140218s2014 xxu |||| 00||| eng d
010 |a 013026468 
020 |a 9781466567009  |9 978-1-4665-6700-9 
035 |a (OCoLC)864709518 
035 |a (DE-599)BVBBV041656677 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
044 |a xxu  |c US 
049 |a DE-739 
050 0 |a TK5103.2 
082 0 |a 005.8  |2 23 
245 1 0 |a Physical layer security in wireless communications  |c ed. by Xiangyun Zhou ... 
264 1 |a Boca Raton [u.a.]  |b CRC Press  |c 2014 
300 |a XVII, 295 S. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Wireless networks and mobile communications  |v 20 
520 |a "Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Comparing to the cryptographic approaches, physical layer security is a fundamentally different paradigm, where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels. Written by pioneering researchers, this book provides a systematic overview of the foundations and recent developments of this promising security technology".. 
650 7 |a TECHNOLOGY & ENGINEERING / Telecommunications  |2 bisacsh 
650 7 |a TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications  |2 bisacsh 
650 4 |a Wireless communication systems  |x Security measures 
650 4 |a TECHNOLOGY & ENGINEERING / Telecommunications 
650 4 |a TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications 
650 0 7 |a Funknetz  |0 (DE-588)4216130-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Spieltheorie  |0 (DE-588)4056243-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Computerunterstützte Kommunikation  |0 (DE-588)4535905-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Computerunterstützte Kommunikation  |0 (DE-588)4535905-2  |D s 
689 0 1 |a Funknetz  |0 (DE-588)4216130-7  |D s 
689 0 2 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 3 |a Spieltheorie  |0 (DE-588)4056243-8  |D s 
689 0 |5 DE-604 
700 1 |a Zhou, Xiangyun  |e Sonstige  |0 (DE-588)1044693819  |4 oth 
830 0 |a Wireless networks and mobile communications  |v 20  |w (DE-604)BV035470637  |9 20 
856 4 |u http://images.tandf.co.uk/common/jackets/websmall/978146656/9781466567009.jpg  |3 Cover image 
856 4 2 |m Digitalisierung UB Passau - ADAM Catalogue Enrichment  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027097166&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
856 4 2 |m Digitalisierung UB Passau - ADAM Catalogue Enrichment  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027097166&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA  |3 Klappentext 
943 1 |a oai:aleph.bib-bvb.de:BVB01-027097166 

Datensatz im Suchindex

_version_ 1819718055827079168
adam_text Contents Preface xi Authors xiii Contributors xv 1 Fundamentals of Physical Layer Security 1 1.1 Information-theoretic Secrecy .......................... 2 1.1.1 Shannon s Cipher System and Perfect Secrecy ............. 2 1.1.2 Information-theoretic Secrecy Metrics ................. 3 1.2 Secret Communication over Noisy Channels .................. 4 1.2.1 Wiretap Channel Model ......................... 4 1.2.2 Coding Mechanisms for Secret Communication ............ 6 1.3 Secret-key Generation from Noisy Channels .................. 10 1.3.1 Channel Model for Secret-key Generation ............... 10 1.3.2 Coding Mechanisms for Secret-key Generation ............ 12 1.4 Conclusion .................................... 13 References ........................................ 14 2 Coding for Wiretap Channels 17 2.1 Coding for the Wiretap Channel II ....................... 17 2.1.1 Basics of Error-Correcting Codes .................... 18 2.1.2 Wiretap II Codes ............................. 20 2.2 Wiretap Coding with Polar Codes ....................... 23 2.2.1 Polar Codes ................................ 23 2.2.2 Polar Wiretap Codes ........................... 26 2.3 Coding for Gaussian Wiretap Channels .................... 27 2.3.1 Error Probability and Secrecy Gain .................. 27 2.3.2 Unimodular Lattice Codes ........................ 28 2.4 Conclusion .................................... 31 Acknowledgment .................................... 31 References ........................................ 31 3 LDPC Codes for the Gaussian Wiretap Channel 33 3.1 Channel Model and Basic Notions ....................... 33 3.2 Coding for Security ................................ 38 3.2.1 Asymptotic Analysis ........................... 38 3.2.2 Optimized Puncturing Distributions .................. 40 3.2.3 Reducing SNR Loss ........................... 40 3.2.4 Finite Block Lengths ........................... 42 3.3 System Aspects .................................. 42 3.4 Concluding Remarks ............................... 44 References ........................................ 45 4 Key Generation from Wireless Channels 47 4.1 Introduction .................................... 47 4.2 Information-theoretic Models for Key Generation ............... 49 4.2.1 Key Generation via Unlimited Public Discussion ........... 49 4.2.2 Key Generation with Rate Constraint in Public Discussion ..... 51 4.2.3 Key Generation with Side-information at Eve ............. 51 4.3 Basic Approaches for Key Generation via Wireless Networks ........ 52 4.4 A Joint Source-Channel Key Agreement Protocol ............... 54 4.4.1 Key Agreement with a Public Channel ................. 54 4.4.2 Key Agreement without a Public Channel ............... 56 4.5 Relay-assisted Key Generation with a Public Channel ............ 59 4.5.1 Relay-assisted Key Generation with One Relay ............ 59 4.5.2 Relay-assisted Key Generation with Multiple Relays ......... 61 4.5.3 Relay-oblivious Key Generation ..................... 62 4.6 Key Agreement with the Presence of an Active Attacker ........... 63 4.6.1 Training Phase .............................. 63 4.6.2 Key Generation Phase .......................... 65 4.7 Conclusion .................................... 66 4.8 Acknowledgment ................................. 67 References ........................................ 67 5 Secrecy with Feedback 69 5.1 Introduction .................................... 69 5.2 The Gaussian Two-way Wiretap Channel ................... 70 5.3 Achieving Secrecy Using Public Discussion ................... 71 5.4 Achieving Secrecy Using Cooperative Jamming ................ 73 5.4.1 Full-duplex Node ............................. 74 5.4.2 Half-duplex Node ............................. 74 5.5 Achieving Secrecy through Discussion and Jamming ............. 75 5.5.1 Jamming with Codewords ........................ 75 5.5.2 Secrecy through Key Generation .................... 78 5.5.3 Block Markov Coding Scheme ...................... 80 5.6 When the Eavesdropper Channel States Are Not Known ........... 82 5.7 Converse ...................................... 84 5.7.1 Outer Bounds ............................... 84 5.7.2 Discussion ................................. 86 5.8 Conclusion .................................... 87 5.9 Proof of Theorem 5.7.5.............................. 88 5.10 Proof of Theorem 5.7.6.............................. 89 References ........................................ 90 6 MIMO Signal Processing Algorithms for Enhanced Physical Layer Security 93 6.1 Introduction .................................... 94 6.2 Physical Layer Security ............................. 94 6.2.1 Signal Processing Aspects ........................ 94 6.2.2 Secrecy Performance Metrics ...................... 95 6.2.3 The Role of CSI ............................. 95 6.3 MIMO Wiretap Channels ............................ 96 6.3.1 Complete CSI............................... 97 6.3.2 Partial CSI................................ 98 6.4 MIMO Wiretap Channel with an External Helper ............... 99 6.5 MIMO Broadcast Channel ............................ 101 6.6 MIMO Interference Channel ........................... 103 6.7 MIMO Relay Wiretap Networks ......................... 107 6.7.1 Relay-aided Cooperation ......................... 107 6.7.2 Untrusted Relaying ............................ 109 6.8 Conclusions .................................... 110 References ........................................ 110 7 Discriminatory Channel Estimation for Secure Wireless Communication 115 7.1 Introduction .................................... 115 7.2 Discriminatory Channel Estimation — Basic Concept ............. 117 7.3 DCE via Feedback and Retraining ....................... 118 7.3.1 Two-Stage Feedback-and-Retraining .................. 118 7.3.2 Multiple-stage Feedback and Retraining ................ 123 7.3.3 Simulation Results and Discussions ................... 124 7.4 Discriminatory Channel Estimation via Two-way Training .......... 126 7.4.1 Two-way DCE Design for Reciprocal Channels ............ 126 7.4.2 Two-way DCE Design for Nonreciprocal Channels .......... 129 7.4.3 Simulation Results and Discussions ................... 131 7.5 Conclusions and Discussions ........................... 134 Acknowledgment .................................... 135 References ........................................ 135 8 Physical Layer Security in OFDM A Networks 137 8.1 Introduction .................................... 137 8.2 Related Works on Secure OFDM/OFDM Networks .............. 138 8.2.1 Secure OFDM Channel ......................... 138 8.2.2 Secure OFDMA Cellular Networks ................... 140 8.2.3 Secure OFDMA Relay Networks .................... 140 8.2.4 Secure OFDM with Implementation Issues ............... 140 8.3 Basics of Resource Allocation for Secret Communications .......... 141 8.3.1 Power Allocation Law for Secrecy .................... 141 8.3.2 Multiple Eavesdroppers ......................... 141 8.4 Resource Allocation for Physical Layer Security in OFDMA Networks . . . 142 8.4.1 Problem Formulation .......................... 143 8.4.2 Optimal Policy .............................. 144 8.4.3 Suboptimal Algorithm .......................... 146 8.4.4 Complexity ................................ 147 8.4.5 Numerical Examples ........................... 147 8.4.6 Discussion on False CSI Feedback ................... 149 8.5 Conclusions and Open Issues .......................... 149 References ........................................ 150 9 The Application of Cooperative Transmissions to Secrecy Communications 153 9.1 Introduction .................................... 153 9.2 When All Nodes Are Equipped with a Single Antenna ............ 154 9.2.1 Cooperative Jamming .......................... 155 9.2.2 Relay Chatting .............................. 157 9.3 MIMO Relay Secrecy Communication Scenarios ................ 163 9.3.1 When CSI of Eavesdroppers Is Known ................. 163 9.3.2 When CSI of Eavesdroppers Is Unknown ............... 168 9.4 Conclusion .................................... 175 Acknowledgment .................................... 175 References ........................................ 175 10 Game Theory for Physical Layer Security on Interference Channels 179 10.1 Introduction .................................... 179 10.2 System Models and Scenarios .......................... 181 10.2.1 Standard MISO Interference Channel ................. 182 10.2.2 MISO Interference Channel with Private Messages .......... 183 10.2.3 MISO Interference Channel with Public Feedback and Private Messages ................................. 185 10.2.4 Discussion and Comparison of Scenarios ................ 187 10.3 Noncooperative Solutions ............................ 188 10.3.1 Noncooperative Games in Strategic Form ............... 189 10.3.2 Solution for the MISO Interference Channel Scenarios ........ 191 10.4 Cooperative Solutions .............................. 192 10.4.1 Bargaining Solutions ........................... 193 10.4.2 Nash Bargaining Solution ........................ 195 10.4.3 Bargaining Algorithm in the Edgeworth Box ............. 196 10.4.4 Walras Equilibrium Solution ...................... 196 10.5 Illustrations and Discussions ........................... 199 10.5.1 Comparison of Utility Regions ..................... 199 10.5.2 Noncooperative and Cooperative Operating Points .......... 200 10.5.3 Bargaining Algorithm Behavior ..................... 201 10.6 Conclusions .................................... 202 Acknowledgment .................................... 203 10.7 Appendix: Proofs ................................. 203 10.7.1 Proof of Theorem 10.3.1......................... 203 10.7.2 Proof of Theorem 10.4.1......................... 204 10.7.3 Proof of Theorem 10.4.2......................... 205 10.7.4 Proof of Theorem 10.4.3......................... 205 References ........................................ 206 11 Ascending Clock Auction for Physical Layer Security 209 11.1 Introduction .................................... 210 11.1.1 Cooperative Jamming for Physical Layer Security .......... 210 11.1.2 Game Theory-based Jamming Power Allocation ............ 211 11.1.3 Ascending Auctions ........................... 211 11.1.4 Chapter Outline ............................. 212 11.2 System Model and Problem Formulation .................... 212 11.2.1 System Model ............................... 212 11.2.2 Source s Utility Function ........................ 214 11.2.3 Jammer s Utility Function ........................ 215 11.3 Auction-based Jamming Power Allocation Schemes .............. 215 11.3.1 Power Allocation Scheme based on Single Object Pay-as-Bid Ascending Clock Auction (P-ACA-S) .................. 215 11.3.2 Power Allocation Scheme based on Traditional Ascending Clock Auction (P-ACA-T) ........................... 216 11.3.3 Power Allocation Scheme based on Alternative Ascending Clock Auction (P-ACA-A) ........................... 218 11.4 Properties of the Proposed Auction-based Power Allocation Schemes .... 219 11.4.1 Optimal Jamming Power for Each Source ............... 220 11.4.2 Convergence ............................... 221 11.4.3 Cheat-proof ................................ 223 11.4.4 Social Welfare Maximization ...................... 226 11.4.5 Complexity and Overhead ........................ 229 11.5 Conclusions and Open Issues .......................... 232 References ........................................ 234 12 Relay and Jammer Cooperation as a Coalitional Game 237 12.1 Introduction .................................... 237 12.1.1 Cooperative Relaying and Cooperative Jamming ........... 237 12.1.2 Relay and Jammer Selection ...................... 238 12.1.3 Coalitional Game Theory ........................ 239 12.1.4 Chapter Outline ............................. 240 12.2 System Model and Problem Formulation .................... 240 12.3 Relay and Jammer Cooperation as a Coalitional Game ............ 242 12.3.1 Coalitional Game Definition ....................... 242 12.3.2 Properties of the Proposed Coalitional Game ............. 244 12.4 Coalition Formation Algorithm ......................... 245 12.4.1 Coalition Formation Concepts ...................... 245 12.4.2 Merge-and-Split Coalition Formation Algorithm ........... 246 12.5 Conclusions and Open Issues .......................... 248 References ........................................ 249 13 Stochastic Geometry Approaches to Secrecy in Large Wireless Networks 253 13.1 Introduction .................................... 253 13.1.1 Motivation ................................ 253 13.1.2 Stochastic Geometry Approaches .................... 254 13.2 Secrecy Graph .................................. 255 13.2.1 Network and Graph Model ....................... 255 13.2.2 Local Connectivity Properties ...................... 256 13.2.3 Global Connectivity Properties ..................... 258 13.2.4 Connectivity Enhancements ....................... 260 13.3 Secrecy Transmission Capacity ......................... 262 13.3.1 Network Model .............................. 262 13.3.2 Capacity Formulation .......................... 262 13.3.3 Illustrative Example ........................... 264 13.4 Current Limitations and Future Directions ................... 268 References ........................................ 269 14 Physical Layer Secrecy in Large Multihop Wireless Networks 271 14.1 Introduction .................................... 271 14.2 Background: Physical Layer Security in One-hop Networks .......... 273 14.3 Secure Connectivity: The Secrecy Graph .................... 274 14.4 Secure Capacity .................................. 275 14.4.1 Background: Throughput Scaling in Large Wireless Networks .... 275 14.4.2 Secrecy Scaling with Known Eavesdropper Locations ......... 277 14.4.3 Secrecy Scaling with Unknown Eavesdropper Locations ....... 277 14.5 Conclusion and Future Work .......................... 284 Acknowledgment .................................... 285 References ........................................ 285 Index 289 Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels. Written by pioneeringresearchers^hysicalLayerSecurity in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi¬ user communication systems, as well as large-scale wireless networks. The book starts with a brief introduction to physical layer security. The rest of the book is organized into four parts based on the different approaches used for the design and analysis of physical layer security techniques: 1. Information Theoretic Approaches: introduces capacity-achieving methods and coding schemes for secure communication, as well as secret key generation and agreement over wireless channels 2. Signal Processing Approaches: covers recent progress in applying signal processing techniques to design physical layer security enhancements 3. Game Theoretic Approaches: discusses the applications of game theory to analyze and design wireless networks with physical layer security considerations 4. Graph Theoretic Approaches: presents the use of tools from graph theory and stochastic geometry to analyze and design large-scale wireless networks with physical layer security constraints Presenting high-level discussions along with specific examples, illustrations, and references to conference and journal articles, this is an ideal reference for postgraduate students, researchers, and engineers that need to obtain a macro-level understanding of physical layer security and its role in future wireless communication systems.
any_adam_object 1
author_GND (DE-588)1044693819
building Verbundindex
bvnumber BV041656677
callnumber-first T - Technology
callnumber-label TK5103
callnumber-raw TK5103.2
callnumber-search TK5103.2
callnumber-sort TK 45103.2
callnumber-subject TK - Electrical and Nuclear Engineering
ctrlnum (OCoLC)864709518
(DE-599)BVBBV041656677
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03158nam a2200541 cb4500</leader><controlfield tag="001">BV041656677</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220127 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">140218s2014 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">013026468</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466567009</subfield><subfield code="9">978-1-4665-6700-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864709518</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041656677</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5103.2</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Physical layer security in wireless communications</subfield><subfield code="c">ed. by Xiangyun Zhou ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 295 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Wireless networks and mobile communications</subfield><subfield code="v">20</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Comparing to the cryptographic approaches, physical layer security is a fundamentally different paradigm, where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels. Written by pioneering researchers, this book provides a systematic overview of the foundations and recent developments of this promising security technology"..</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY &amp; ENGINEERING / Telecommunications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY &amp; ENGINEERING / Mobile &amp; Wireless Communications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY &amp; ENGINEERING / Telecommunications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY &amp; ENGINEERING / Mobile &amp; Wireless Communications</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Xiangyun</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1044693819</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Wireless networks and mobile communications</subfield><subfield code="v">20</subfield><subfield code="w">(DE-604)BV035470637</subfield><subfield code="9">20</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://images.tandf.co.uk/common/jackets/websmall/978146656/9781466567009.jpg</subfield><subfield code="3">Cover image</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=027097166&amp;sequence=000003&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=027097166&amp;sequence=000004&amp;line_number=0002&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027097166</subfield></datafield></record></collection>
id DE-604.BV041656677
illustrated Not Illustrated
indexdate 2024-12-24T04:01:49Z
institution BVB
isbn 9781466567009
language English
lccn 013026468
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027097166
oclc_num 864709518
open_access_boolean
owner DE-739
owner_facet DE-739
physical XVII, 295 S.
publishDate 2014
publishDateSearch 2014
publishDateSort 2014
publisher CRC Press
record_format marc
series Wireless networks and mobile communications
series2 Wireless networks and mobile communications
spellingShingle Physical layer security in wireless communications
Wireless networks and mobile communications
TECHNOLOGY & ENGINEERING / Telecommunications bisacsh
TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh
Wireless communication systems Security measures
TECHNOLOGY & ENGINEERING / Telecommunications
TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications
Funknetz (DE-588)4216130-7 gnd
Spieltheorie (DE-588)4056243-8 gnd
Kryptologie (DE-588)4033329-2 gnd
Computerunterstützte Kommunikation (DE-588)4535905-2 gnd
subject_GND (DE-588)4216130-7
(DE-588)4056243-8
(DE-588)4033329-2
(DE-588)4535905-2
title Physical layer security in wireless communications
title_auth Physical layer security in wireless communications
title_exact_search Physical layer security in wireless communications
title_full Physical layer security in wireless communications ed. by Xiangyun Zhou ...
title_fullStr Physical layer security in wireless communications ed. by Xiangyun Zhou ...
title_full_unstemmed Physical layer security in wireless communications ed. by Xiangyun Zhou ...
title_short Physical layer security in wireless communications
title_sort physical layer security in wireless communications
topic TECHNOLOGY & ENGINEERING / Telecommunications bisacsh
TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh
Wireless communication systems Security measures
TECHNOLOGY & ENGINEERING / Telecommunications
TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications
Funknetz (DE-588)4216130-7 gnd
Spieltheorie (DE-588)4056243-8 gnd
Kryptologie (DE-588)4033329-2 gnd
Computerunterstützte Kommunikation (DE-588)4535905-2 gnd
topic_facet TECHNOLOGY & ENGINEERING / Telecommunications
TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications
Wireless communication systems Security measures
Funknetz
Spieltheorie
Kryptologie
Computerunterstützte Kommunikation
url http://images.tandf.co.uk/common/jackets/websmall/978146656/9781466567009.jpg
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027097166&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027097166&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV035470637
work_keys_str_mv AT zhouxiangyun physicallayersecurityinwirelesscommunications