Physical Layer Security in Random Cellular Networks

Physical Layer Security in Random Cellular Networks
Author: Hui-Ming Wang,Tong-Xing Zheng
Publsiher: Springer
Total Pages: 113
Release: 2016-10-04
Genre: Computers
ISBN: 9789811015755

Download Physical Layer Security in Random Cellular Networks Book in PDF, Epub and Kindle

This book investigates key security issues in connection with the physical layer for random wireless cellular networks. It first introduces readers to the fundamentals of information theoretic security in the physical layer. By examining recently introduced security techniques for wireless point-to-point communications, the book proposes new solutions to physical layer security based on stochastic geometric frameworks for random cellular networks. It subsequently elaborates on physical-layer security in multi-tier heterogeneous networks. With the new modeled settings, the authors also verify the security performance with the impact of the full-duplex transceivers. The specific model design presented here offers a valuable point of reference for readers in related areas. In addition, the book highlights promising topics and proposes potential future research directions.

Physical Layer Security in Wireless Communications

Physical Layer Security in Wireless Communications
Author: Xiangyun Zhou,Lingyang Song,Yan Zhang
Publsiher: CRC Press
Total Pages: 308
Release: 2016-04-19
Genre: Computers
ISBN: 9781466567016

Download Physical Layer Security in Wireless Communications Book in PDF, Epub and Kindle

Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the communication syst

Physical Layer Security

Physical Layer Security
Author: Khoa N. Le
Publsiher: Springer Nature
Total Pages: 213
Release: 2021-01-24
Genre: Technology & Engineering
ISBN: 9783030553661

Download Physical Layer Security Book in PDF, Epub and Kindle

This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal multiple access (NOMA). The authors have provided these under various practical scenarios, and developed theoretical aspects to validate their proposed applications. Presents physical layer security (PLS) under correlated fading environments, 5G wireless networks, and NOMA networks; Provides end-to-end analyses, combination of channel correlation and outdated CSI and their effects on PL; Includes contributions of PLS research written by global experts in academia and industry.

Physical Layer Security in Wireless Cooperative Networks

Physical Layer Security in Wireless Cooperative Networks
Author: Li Wang
Publsiher: Springer
Total Pages: 181
Release: 2017-08-31
Genre: Technology & Engineering
ISBN: 9783319618630

Download Physical Layer Security in Wireless Cooperative Networks Book in PDF, Epub and Kindle

This book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath channel environment. Resource allocation strategies to enhance secrecy performance in D2D communications are also discussed in this book. It contributes to formulating user social behaviors and utilizing social characteristics to improve the secrecy performance in wireless cooperative networks. This book not only analyzes the secrecy enhancement with certain techniques, but also pursues to find the relationships or tradeoffs among the secrecy performance, energy consumption, channel conditions, and other essential factors in wireless communications. This book targets researchers and professionals specializing in electronic engineering, computer science,wireless communications and networks. Advanced level students in electrical engineering and computer science will also find this book useful as a secondary text.

Trusted Communications with Physical Layer Security for 5G and Beyond

Trusted Communications with Physical Layer Security for 5G and Beyond
Author: Trung Q. Duong,Xiangyun Zhou,H. Vincent Poor
Publsiher: IET
Total Pages: 577
Release: 2017-10-06
Genre: Computers
ISBN: 9781785612350

Download Trusted Communications with Physical Layer Security for 5G and Beyond Book in PDF, Epub and Kindle

Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.

Secrecy Covertness and Authentication in Wireless Communications

Secrecy  Covertness and Authentication in Wireless Communications
Author: Yulong Shen
Publsiher: Springer Nature
Total Pages: 373
Release: 2024
Genre: Electronic Book
ISBN: 9783031384653

Download Secrecy Covertness and Authentication in Wireless Communications Book in PDF, Epub and Kindle

Security Aware Device to Device Communications Underlaying Cellular Networks

Security Aware Device to Device Communications Underlaying Cellular Networks
Author: Aiqing Zhang,Liang Zhou,Lei Wang
Publsiher: Springer
Total Pages: 73
Release: 2016-06-08
Genre: Computers
ISBN: 9783319324586

Download Security Aware Device to Device Communications Underlaying Cellular Networks Book in PDF, Epub and Kindle

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user’s throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book. This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency. This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.

Physical Layer Security Issues in Massive MIMO and GNSS

Physical Layer Security Issues in Massive MIMO and GNSS
Author: Ziya Gülgün
Publsiher: Linköping University Electronic Press
Total Pages: 30
Release: 2021-02-10
Genre: Electronic Book
ISBN: 9789179296988

Download Physical Layer Security Issues in Massive MIMO and GNSS Book in PDF, Epub and Kindle

Wireless communication technology has evolved rapidly during the last 20 years. Nowadays, there are huge networks providing communication infrastructures to not only people but also to machines, such as unmanned air and ground vehicles, cars, household appliances and so on. There is no doubt that new wireless communication technologies must be developed, that support the data traffic in these emerging, large networks. While developing these technologies, it is also important to investigate the vulnerability of these technologies to different malicious attacks. In particular, spoofing and jamming attacks should be investigated and new countermeasure techniques should be developed. In this context, spoofing refers to the situation in which a receiver identifies falsified signals, that are transmitted by the spoofers, as legitimate or trustable signals. Jamming, on the other hand, refers to the transmission of radio signals that disrupt communications by decreasing the signal-to-interference-and-noise ratio (SINR) on the receiver side. In this thesis, we analyze the effects of spoofing and jamming both on global navigation satellite system (GNSS) and on massive multiple-input multiple-output (MIMO) communications. GNSS is everywhere and used to provide location information. Massive MIMO is one of the cornerstone technologies in 5G. We also propose countermeasure techniques to the studied spoofing and jamming attacks. More specifically, in paper A we analyze the effects of distributed jammers on massive MIMO and answer the following questions: Is massive MIMO more robust to distributed jammers compared with previous generation’s cellular networks? Which jamming attack strategies are the best from the jammer’s perspective, and can the jamming power be spread over space to achieve more harmful attacks? In paper B, we propose a detector for GNSS receivers that is able to detect multiple spoofers without having any prior information about the attack strategy or the number of spoofers in the environment.