Physical layer security in random cellular networks /
Saved in:
Author / Creator: | Wang, Hui-Ming, author. |
---|---|
Imprint: | Singapore, Singapore : Springer, [2016] |
Description: | 1 online resource (xviii, 113 pages) |
Language: | English |
Series: | SpringerBriefs in computer science SpringerBriefs in computer science. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11267429 |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | 11267429 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 161006s2016 si ob 000 0 eng d | ||
005 | 20240701192518.6 | ||
015 | |a GBB966826 |2 bnb | ||
016 | 7 | |a 019336173 |2 Uk | |
019 | |a 960281544 |a 960760851 |a 961828262 |a 962813895 |a 964883557 |a 965140568 |a 966929596 |a 967625780 |a 990738091 |a 1005794401 |a 1011848961 |a 1048157712 |a 1066437519 |a 1105177218 | ||
020 | |a 9789811015755 |q (electronic bk.) | ||
020 | |a 9811015759 |q (electronic bk.) | ||
020 | |z 9789811015748 | ||
020 | |z 9811015740 | ||
024 | 7 | |a 10.1007/978-981-10-1575-5 |2 doi | |
024 | 8 | |a 10.1007/978-981-10-1 | |
035 | |a (OCoLC)959979953 |z (OCoLC)960281544 |z (OCoLC)960760851 |z (OCoLC)961828262 |z (OCoLC)962813895 |z (OCoLC)964883557 |z (OCoLC)965140568 |z (OCoLC)966929596 |z (OCoLC)967625780 |z (OCoLC)990738091 |z (OCoLC)1005794401 |z (OCoLC)1011848961 |z (OCoLC)1048157712 |z (OCoLC)1066437519 |z (OCoLC)1105177218 | ||
035 | 9 | |a (OCLCCM-CC)959979953 | |
037 | |a com.springer.onix.9789811015755 |b Springer Nature | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d YDX |d IDEBK |d N$T |d EBLCP |d OCLCQ |d OCLCO |d AZU |d GW5XE |d OCLCO |d OCLCF |d STF |d UPM |d VT2 |d IDB |d IOG |d OTZ |d IAD |d JBG |d ICW |d CNCGM |d ILO |d MERER |d OCLCQ |d ICN |d OCLCQ |d ESU |d U3W |d MERUC |d BUF |d REB |d CAUOI |d OCLCQ |d UAB |d JG0 |d OCLCQ |d CEF |d KSU |d EZ9 |d WYU |d OCLCQ |d UKMGB |d UKAHL |d LQU |d OCLCQ | ||
049 | |a MAIN | ||
050 | 4 | |a TK5105.59 |b .W36 2016eb | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a UKN |2 bicssc | |
100 | 1 | |a Wang, Hui-Ming, |e author. | |
245 | 1 | 0 | |a Physical layer security in random cellular networks / |c Hui-Ming Wang, Tong-Xing Zheng. |
264 | 1 | |a Singapore, Singapore : |b Springer, |c [2016] | |
300 | |a 1 online resource (xviii, 113 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a SpringerBriefs in computer science | |
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Preface; Acknowledgments; Contents; Acronyms; Notations; 1 Wireless Physical Layer Security; 1.1 Information-Theoretic Security; 1.1.1 Encryption; 1.1.2 Physical Layer Security; 1.2 Fundamentals of Information-Theoretic Security; 1.2.1 Shannon's Perfect Secrecy; 1.2.2 Wyner's Secrecy Conditions; 1.3 Secrecy Metrics; 1.3.1 Secrecy Capacity/Rate; 1.3.2 Ergodic Secrecy Capacity/Rate; 1.3.3 Secrecy Outage/Throughput; 1.3.4 Wyner's Wiretap Code; 1.4 Existing Techniques in Physical Layer Security; 1.4.1 MIMO; 1.4.2 Node Cooperation; 1.4.3 Full-Duplex Transceiver; 1.5 Summary; References. | |
505 | 8 | |a 2 Random Cellular Networks and Stochastic Geometry2.1 Deployment of Cellular Networks; 2.1.1 Modeling and Analyzing Random Cellular Networks; 2.1.2 Stochastic Geometry Approach; 2.2 Fundamentals of Stochastic Geometry; 2.2.1 Point Process; 2.2.2 Poisson Point Process; 2.3 Using Stochastic Geometry to Model Wireless Networks; 2.3.1 Cellular Networks; 2.3.2 Heterogeneous Cellular Networks; 2.3.3 Wireless Ad hoc Networks; 2.4 Interference Characterization; 2.5 Physical Layer Security in Random Cellular Networks; 2.5.1 Connection Outage and Secrecy Outage; 2.5.2 Secrecy Throughput. | |
505 | 8 | |a 2.5.3 Network-Wide Secrecy Throughput2.5.4 A Brief Survey on Physical Layer Security in Wireless Networks; References; 3 Physical Layer Security in Cellular Networks Under TDMA; 3.1 Introduction; 3.2 System Model; 3.2.1 AN-Aided Secrecy Signaling; 3.2.2 On -- Off Secrecy Transmission Strategy; 3.3 Secrecy Outage Probability Minimization; 3.4 Secrecy Throughput Maximization; 3.4.1 Dynamic Parameter Transmission Scheme; 3.4.2 Static Parameter Transmission Scheme; 3.5 Simulations; 3.5.1 Outage-Optimal Power Allocation; 3.5.2 Secrecy Throughput Optimization for DPTS and SPTS. | |
505 | 8 | |a 3.5.3 Comparison Between DPTS and SPTS3.6 Conclusions; References; 4 Physical Layer Security in Heterogeneous Cellular Network; 4.1 Introduction; 4.2 System Model; 4.2.1 Cellular Deployment and Channel Model; 4.2.2 Secure Transmission Signaling; 4.2.3 Secrecy Mobile Association Policy; 4.3 Secrecy Performance Analysis; 4.3.1 User Connection Probability; 4.3.2 User Secrecy Probability; 4.3.3 Network Secrecy Throughput; 4.3.4 Average User Secrecy Throughput; 4.4 Conclusions; References; 5 Physical Layer Security in Heterogeneous Ad hoc Networks with Full-Duplex Receivers; 5.1 Introduction. | |
505 | 8 | |a 5.2 System Model5.2.1 Heterogeneous Ad hoc Networks; 5.2.2 Signal Model; 5.2.3 Performance Metrics; 5.3 Single-Antenna-Jamming FD Receiver; 5.3.1 Connection Probability; 5.3.2 Secrecy Outage Probability; 5.3.3 Network-Wide Secrecy Throughput; 5.4 Multi-antenna Jamming FD Receiver; 5.4.1 Connection Probability; 5.4.2 Secrecy Outage Probability; 5.4.3 Network-Wide Secrecy Throughput; 5.5 Conclusions; References; 6 Conclusions and Future Research Directions; 6.1 Conclusions; 6.2 Future Research Directions. | |
520 | |a This book investigates key security issues in connection with the physical layer for random wireless cellular networks. It first introduces readers to the fundamentals of information theoretic security in the physical layer. By examining recently introduced security techniques for wireless point-to-point communications, the book proposes new solutions to physical layer security based on stochastic geometric frameworks for random cellular networks. It subsequently elaborates on physical-layer security in multi-tier heterogeneous networks. With the new modeled settings, the authors also verify the security performance with the impact of the full-duplex transceivers. The specific model design presented here offers a valuable point of reference for readers in related areas. In addition, the book highlights promising topics and proposes potential future research directions. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Wireless communication systems |x Security measures. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Wireless communication systems |x Security measures. |2 fast |0 (OCoLC)fst01176222 | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Zheng, Tong-Xing, |e author. | |
776 | 0 | 8 | |i Print version: |t Physical Layer Security in Random Cellular Networks. |d [Place of publication not identified] : Springer-Verlag New York Inc 2016 |z 9789811015748 |w (OCoLC)950953474 |
830 | 0 | |a SpringerBriefs in computer science. |0 http://id.loc.gov/authorities/names/no2011109396 | |
903 | |a HeVa | ||
929 | |a oclccm | ||
999 | f | f | |i 8a59e59e-cc89-5bc8-a10c-fc9e8f86d817 |s 8cf5ab56-5f28-5d83-81cb-b9ea9d6c25be |
928 | |t Library of Congress classification |a TK5105.59 .W36 2016eb |l Online |c UC-FullText |u https://link.springer.com/10.1007/978-981-10-1575-5 |z Springer Nature |g ebooks |i 12541632 |