Read more
Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.
List of contents
- Part I: Fundamentals of physical layer security
- Chapter 1: Secrecy metrics for physical layer security over fading channels
- Chapter 2: Secure data networks with channel uncertainty
- Chapter 3: Confidential and energy-efficient communications by physical layer security
- Part II: Physical layer security for multiple antenna technologies
- Chapter 4: Antenna selection strategies for wiretap channels
- Chapter 5: Physical layer security for massive MIMO systems
- Chapter 6: Physical layer security for massive MIMO with anti-jamming
- Chapter 7: Physical layer security for multiuser relay networks
- Chapter 8: Trusted wireless communications with spatial multiplexing
- Part III: Physical layer security with emerging 5G technologies
- Chapter 9: Physical layer security for wirelessly powered communication systems
- Chapter 10: Physical layer security for D2D-enabled cellular networks
- Chapter 11: Physical layer security for cognitive radio networks
- Chapter 12: Physical layer security in mmWave cellular networks
- Part IV: Physical layer security with emerging modulation technologies
- Chapter 13: Directional-modulation-enabled physical-layer wireless security
- Chapter 14: Secure waveforms for 5G systems
- Chapter 15: Physical layer security in non-orthogonal multiple access
- Chapter 16: Physical layer security for MIMOME-OFDM systems: spatial versus temporal artificial noise
- Part V: Applications of physical layer security
- Chapter 17: Physical layer security for real-world applications: use cases, results and open challenges
- Chapter 18: Key generation from wireless channels: a survey and practical implementation
- Chapter 19: Application cases of secret key generation in communication nodes and terminals
- Chapter 20: Application cases of secrecy coding in communication nodes and terminals
Summary
Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.