TY - BOOK ID - 14305023 TI - Securing wireless communications at the physical layer AU - Liu, Ruoheng. AU - Trappe, Wade. PY - 2010 SN - 1441914102 144191384X 9786612837890 1441913858 1282837893 1489983759 PB - New York ; London : Springer, DB - UniCat KW - Wireless communication systems KW - Electrical & Computer Engineering KW - Telecommunications KW - Electrical Engineering KW - Engineering & Applied Sciences KW - Security measures KW - Telecommunication KW - Security measures. KW - Engineering. KW - Data structures (Computer science). KW - Data encryption (Computer science). KW - Electrical engineering. KW - Communications Engineering, Networks. KW - Signal, Image and Speech Processing. KW - Data Structures, Cryptology and Information Theory. KW - Data Encryption. KW - Telecommunication. KW - Data structures (Computer scienc. KW - Data Structures and Information Theory. KW - Cryptology. KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Computer security KW - Cryptography KW - Electric communication KW - Mass communication KW - Telecom KW - Telecommunication industry KW - Communication KW - Information theory KW - Telecommuting KW - Signal processing. KW - Image processing. KW - Speech processing systems. KW - Information structures (Computer science) KW - Structures, Data (Computer science) KW - Structures, Information (Computer science) KW - Electronic data processing KW - File organization (Computer science) KW - Abstract data types (Computer science) KW - Computational linguistics KW - Electronic systems KW - Modulation theory KW - Oral communication KW - Speech KW - Singing voice synthesizers KW - Pictorial data processing KW - Picture processing KW - Processing, Image KW - Imaging systems KW - Optical data processing KW - Processing, Signal KW - Information measurement KW - Signal theory (Telecommunication) KW - Electric engineering KW - Engineering UR - https://www.unicat.be/uniCat?func=search&query=sysid:14305023 AB - Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer. Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored. Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications. ER -