Ulteriori informazioni 
Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.
Sommario
 - Part I: Fundamentals of physical layer security
 
- Chapter 1: Secrecy metrics for physical layer security over fading channels
 
- Chapter 2: Secure data networks with channel uncertainty
 
- Chapter 3: Confidential and energy-efficient communications by physical layer security
 
 
 
 
 
 
- Part II: Physical layer security for multiple antenna technologies
 
- Chapter 4: Antenna selection strategies for wiretap channels
 
- Chapter 5: Physical layer security for massive MIMO systems
 
- Chapter 6: Physical layer security for massive MIMO with anti-jamming
 
- Chapter 7: Physical layer security for multiuser relay networks
 
- Chapter 8: Trusted wireless communications with spatial multiplexing
 
 
 
 
 
 
- Part III: Physical layer security with emerging 5G technologies
 
- Chapter 9: Physical layer security for wirelessly powered communication systems
 
- Chapter 10: Physical layer security for D2D-enabled cellular networks
 
- Chapter 11: Physical layer security for cognitive radio networks
 
- Chapter 12: Physical layer security in mmWave cellular networks
 
 
 
 
 
 
- Part IV: Physical layer security with emerging modulation technologies
 
- Chapter 13: Directional-modulation-enabled physical-layer wireless security
 
- Chapter 14: Secure waveforms for 5G systems
 
- Chapter 15: Physical layer security in non-orthogonal multiple access
 
- Chapter 16: Physical layer security for MIMOME-OFDM systems: spatial versus temporal artificial noise
 
 
 
 
 
 
- Part V: Applications of physical layer security
 
- Chapter 17: Physical layer security for real-world applications: use cases, results and open challenges
 
- Chapter 18: Key generation from wireless channels: a survey and practical implementation
 
- Chapter 19: Application cases of secret key generation in communication nodes and terminals
 
- Chapter 20: Application cases of secrecy coding in communication nodes and terminals
 
 
 
 
 
 RiassuntoSecurely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.