Physical-Layer Security: From Information Theory to Security Engineering by Matthieu BlochPhysical-Layer Security: From Information Theory to Security Engineering by Matthieu Bloch

Physical-Layer Security: From Information Theory to Security Engineering

byMatthieu Bloch, João Barros

Hardcover | November 14, 2011

Pricing and Purchase Info

$108.79

Earn 544 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included.
Title:Physical-Layer Security: From Information Theory to Security EngineeringFormat:HardcoverDimensions:346 pages, 9.72 × 6.85 × 0.83 inPublished:November 14, 2011Publisher:Cambridge University PressLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0521516501

ISBN - 13:9780521516501

Reviews

Table of Contents

Part I. Preliminaries: 1. An information-theoretic approach to physical-layer security; 2. Fundamentals of information theory; Part II. Information-Theoretic Security: 3. Secrecy capacity; 4. Secret-key capacity; 5. Security limits of Gaussian and wireless channels; Part III. Coding and System Aspects: 6. Coding for secrecy; 7. System aspects; Part IV. Other Applications of Information-Theoretic Security: 8. Secrecy and jamming in multi-user channels; 8. Network coding security.