Muutke küpsiste eelistusi

E-raamat: Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems

  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping. While most articles on physical layer secrecy focus on the information-theoretic aspect, we focus specifically on the signal processing aspects, including beamforming and precoding techniques for data transmission and discriminatory training schemes for channel estimation. The discussions will cover cases with collocated and with distributed antennas, i.e., relays. The topics covered will be of interest to researchers in the signal processing community as well to practitioners and engineers working in this area. This book will also review recent works that apply these signal processing approaches to more advanced wireless systems, such as OFDM systems, multicell systems, cognitive radio, multihop networks etc. This will draw interest from researchers that wish to pursue the topic further in these new directions.
This book is divided into three parts: (i) data transmission, (ii) channel estimation and (iii) advanced applications. Even though many works exist in the literature on these topics, the approaches and perspectives taken were largely diverse. This book provides a more organized and systematic view of these designs and to lay a solid foundation for future work in these areas. Moreover, by presenting the work from a signal processing perspective, this book will also trigger more research interest from the signal processing community and further advance the field of physical layer secrecy along the described directions.
This book allows readers to gain basic understanding of works on physical layer secrecy, knowledge of how signal processing techniques can be applied to this area, and the application of these techniques in advanced wireless applications.
1 Introduction
1(10)
1.1 Security in Wireless Communication Systems
1(2)
1.2 Background on Physical Layer Secrecy
3(3)
1.2.1 Keyless Physical Layer Secrecy Transmissions
4(1)
1.2.2 Channel-Based Secret Key Generation
5(1)
1.2.3 Signal Designs with Low Probability of Interception and Detection
6(1)
1.3 Book Overview
6(1)
References
7(4)
2 Background on Information-Theoretic Physical Layer Secrecy
11(18)
2.1 The Basic Wiretap Channel
12(4)
2.2 Gaussian and MIMO Gaussian Wiretap Channels
16(2)
2.3 Compound Wiretap Channel
18(3)
2.4 Ergodic Secrecy Capacity
21(3)
2.5 Secrecy Outage
24(2)
2.6 Summary and Discussions
26(1)
References
27(2)
3 Secrecy Precoding and Beamforming in Multi-Antenna Wireless Systems
29(32)
3.1 Secrecy Beamforming and Precoding Schemes
30(7)
3.1.1 Secrecy Beamforming for the Basic Multi-Antenna Wiretap Channel
31(3)
3.1.2 Secrecy Precoding for the Basic Multi-Antenna Wiretap Channel
34(3)
3.2 Secrecy Beamforming for Systems with Multiple Destinations and Eavesdroppers
37(6)
3.2.1 Multicast Secrecy Beamforming
38(2)
3.2.2 Broadcast Secrecy Beamforming
40(3)
3.3 Secrecy Beamforming and Precoding with Artificial Noise
43(13)
3.3.1 Secrecy Beamforming with Artificial Noise
44(4)
3.3.2 Power Allocation Between Information Signal and Artificial Noise
48(4)
3.3.3 Secrecy Precoding with Artificial Noise
52(4)
3.4 Secrecy Beamforming with Artificial Noise for Systems with Multiple Destinations and Eavesdroppers
56(2)
3.5 Summary and Discussions
58(1)
References
59(2)
4 Distributed Secrecy Beamforming and Precoding in Multi-Antenna Wireless Relay Systems
61(36)
4.1 Distributed Secrecy Beamforming and Precoding with Trusted Relays
62(13)
4.1.1 Distributed Secrecy Beamforming and Precoding with Trusted Decode-and-Forward Relays
63(8)
4.1.2 Distributed Secrecy Beamforming and Precoding with Trusted Amplify-and-Forward Relays
71(4)
4.2 Distributed Secrecy Beamforming and Precoding with Untrusted Relays
75(6)
4.3 Distributed Secrecy Beamforming and Precoding with Artificial Noise
81(13)
4.3.1 Relays as Pure Cooperative Jammers
83(5)
4.3.2 Relays with Both Information and Artificial Noise Transmissions
88(6)
4.4 Summary and Discussions
94(1)
References
95(2)
5 Secrecy-Enhancing Channel Estimation in Multi-Antenna Wireless Systems
97(28)
5.1 Feedback-and-Retraining Discriminatory Channel Estimation Scheme
98(8)
5.2 Two-Way Training Discriminatory Channel Estimation Scheme
106(14)
5.2.1 Two-Way DCE Scheme for Reciprocal Channels
108(6)
5.2.2 Two-Way DCE Scheme for Nonreciprocal Channels
114(6)
5.3 Summary and Discussions
120(2)
References
122(3)
6 Enhancing Physical-Layer Secrecy in Modern Wireless Communication Systems
125(8)
6.1 Secrecy in Cognitive Radio Networks
125(3)
6.2 Secrecy in OFDM and OFDMA Systems
128(1)
6.3 Secrecy in Ad Hoc and Multihop Networks
129(2)
6.4 Secrecy in Cellular Networks
131(1)
References
131(2)
Index 133