Physical-Layer Security for Cooperative Relay Networks

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Physical-Layer Security for Cooperative Relay Networks by Yulong Zou, Jia Zhu, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Yulong Zou, Jia Zhu ISBN: 9783319311746
Publisher: Springer International Publishing Publication: April 20, 2016
Imprint: Springer Language: English
Author: Yulong Zou, Jia Zhu
ISBN: 9783319311746
Publisher: Springer International Publishing
Publication: April 20, 2016
Imprint: Springer
Language: English

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.

Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.

Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.

Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.

Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.

More books from Springer International Publishing

Cover of the book Virtual Work and Shape Change in Solid Mechanics by Yulong Zou, Jia Zhu
Cover of the book Scale in Literature and Culture by Yulong Zou, Jia Zhu
Cover of the book Promoting Information in the Marketplace for Financial Services by Yulong Zou, Jia Zhu
Cover of the book Forensic Memory by Yulong Zou, Jia Zhu
Cover of the book Dynamics of Big Internet Industry Groups and Future Trends by Yulong Zou, Jia Zhu
Cover of the book Evidence-Based Practice in Clinical Social Work by Yulong Zou, Jia Zhu
Cover of the book Heart Failure: From Research to Clinical Practice by Yulong Zou, Jia Zhu
Cover of the book Media in the Middle East by Yulong Zou, Jia Zhu
Cover of the book Dispersion Stability, Microstructure and Phase Transition of Anisotropic Nanodiscs by Yulong Zou, Jia Zhu
Cover of the book Moons of the Solar System by Yulong Zou, Jia Zhu
Cover of the book From Classical to Modern Algebraic Geometry by Yulong Zou, Jia Zhu
Cover of the book The Mathematics and Biology of the Biodistribution of Radiopharmaceuticals - A Clinical Perspective by Yulong Zou, Jia Zhu
Cover of the book Perspectives in Environmental Toxicology by Yulong Zou, Jia Zhu
Cover of the book High-Performance AD and DA Converters, IC Design in Scaled Technologies, and Time-Domain Signal Processing by Yulong Zou, Jia Zhu
Cover of the book Biologically Rationalized Computing Techniques For Image Processing Applications by Yulong Zou, Jia Zhu
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy