000 03417nam a22005415i 4500
001 978-3-319-61863-0
003 DE-He213
005 20220801222350.0
007 cr nn 008mamaa
008 170831s2018 sz | s |||| 0|eng d
020 _a9783319618630
_9978-3-319-61863-0
024 7 _a10.1007/978-3-319-61863-0
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
100 1 _aWang, Li.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_961103
245 1 0 _aPhysical Layer Security in Wireless Cooperative Networks
_h[electronic resource] /
_cby Li Wang.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXVII, 181 p. 10 illus., 3 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aWireless Networks,
_x2366-1445
505 0 _a1 Introduction -- 2 Existing Techniques in Physical Layer Security -- 3 Secrecy Analysis with Time-Reversal Technique in Distributed Transmission System -- 4 Spatial Modulation in Physical Layer Security -- 5 Cooperative Security in D2D Communications -- 6 Summary.
520 _aThis book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath channel environment. Resource allocation strategies to enhance secrecy performance in D2D communications are also discussed in this book. It contributes to formulating user social behaviors and utilizing social characteristics to improve the secrecy performance in wireless cooperative networks. This book not only analyzes the secrecy enhancement with certain techniques, but also pursues to find the relationships or tradeoffs among the secrecy performance, energy consumption, channel conditions, and other essential factors in wireless communications. This book targets researchers and professionals specializing in electronic engineering, computer science,wireless communications and networks. Advanced level students in electrical engineering and computer science will also find this book useful as a secondary text.
650 0 _aTelecommunication.
_910437
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_961104
710 2 _aSpringerLink (Online service)
_961105
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319618623
776 0 8 _iPrinted edition:
_z9783319618647
776 0 8 _iPrinted edition:
_z9783319871790
830 0 _aWireless Networks,
_x2366-1445
_961106
856 4 0 _uhttps://doi.org/10.1007/978-3-319-61863-0
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c80690
_d80690