000 | 03417nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-319-61863-0 | ||
003 | DE-He213 | ||
005 | 20220801222350.0 | ||
007 | cr nn 008mamaa | ||
008 | 170831s2018 sz | s |||| 0|eng d | ||
020 |
_a9783319618630 _9978-3-319-61863-0 |
||
024 | 7 |
_a10.1007/978-3-319-61863-0 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aWang, Li. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _961103 |
|
245 | 1 | 0 |
_aPhysical Layer Security in Wireless Cooperative Networks _h[electronic resource] / _cby Li Wang. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXVII, 181 p. 10 illus., 3 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aWireless Networks, _x2366-1445 |
|
505 | 0 | _a1 Introduction -- 2 Existing Techniques in Physical Layer Security -- 3 Secrecy Analysis with Time-Reversal Technique in Distributed Transmission System -- 4 Spatial Modulation in Physical Layer Security -- 5 Cooperative Security in D2D Communications -- 6 Summary. | |
520 | _aThis book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath channel environment. Resource allocation strategies to enhance secrecy performance in D2D communications are also discussed in this book. It contributes to formulating user social behaviors and utilizing social characteristics to improve the secrecy performance in wireless cooperative networks. This book not only analyzes the secrecy enhancement with certain techniques, but also pursues to find the relationships or tradeoffs among the secrecy performance, energy consumption, channel conditions, and other essential factors in wireless communications. This book targets researchers and professionals specializing in electronic engineering, computer science,wireless communications and networks. Advanced level students in electrical engineering and computer science will also find this book useful as a secondary text. | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _961104 |
710 | 2 |
_aSpringerLink (Online service) _961105 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319618623 |
776 | 0 | 8 |
_iPrinted edition: _z9783319618647 |
776 | 0 | 8 |
_iPrinted edition: _z9783319871790 |
830 | 0 |
_aWireless Networks, _x2366-1445 _961106 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-61863-0 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c80690 _d80690 |