skip to content
Physical-layer security for cooperative relay networks Preview this item
ClosePreview this item
Checking...

Physical-layer security for cooperative relay networks

Author: Yulong Zou; Jia Zhu
Publisher: Switzerland : Springer, [2016] ©2016
Series: Wireless networks (Springer (Firm))
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
"This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Zou, Yulong.
Physical-layer security for cooperative relay networks.
Switzerland : Springer, [2016]
(OCoLC)939531679
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Yulong Zou; Jia Zhu
ISBN: 9783319311746 3319311743
OCLC Number: 947961176
Description: 1 online resource (ix, 104 pages) : illustrations (some color).
Contents: Introduction --
Relay Selection for Enhancing Wireless Secrecy against Eavesdropping --
Joint Relay and Jammer Selection for Wireless Physical-Layer Security --
Security-Reliability Tradeoff for Cooperative Relay Networks --
Improving Security-Reliability Tradeoff Through Joint Relay and Jammer Selection --
Summary.
Series Title: Wireless networks (Springer (Firm))
Responsibility: Yulong Zou, Jia Zhu.

Abstract:

"This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection. Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination. Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource"--Provided by publisher.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(2)

User lists with this item (1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/947961176> # Physical-layer security for cooperative relay networks
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "947961176" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/sz> ;
    schema:about <http://dewey.info/class/005.82/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/2923113021#Topic/wireless_communication_systems_security_measures> ; # Wireless communication systems--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/2923113021#Topic/data_encryption_computer_science> ; # Data encryption (Computer science)
    schema:author <http://experiment.worldcat.org/entity/work/data/2923113021#Person/zhu_jia> ; # Jia Zhu
    schema:author <http://experiment.worldcat.org/entity/work/data/2923113021#Person/zou_yulong> ; # Yulong Zou
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2016" ;
    schema:datePublished "2016" ;
    schema:description ""This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection. Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination. Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource"--Provided by publisher."@en ;
    schema:description "Introduction -- Relay Selection for Enhancing Wireless Secrecy against Eavesdropping -- Joint Relay and Jammer Selection for Wireless Physical-Layer Security -- Security-Reliability Tradeoff for Cooperative Relay Networks -- Improving Security-Reliability Tradeoff Through Joint Relay and Jammer Selection -- Summary."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/2923113021> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/2366-1445> ; # Wireless networks,
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/2923113021#Series/wireless_networks_springer_firm> ; # Wireless networks (Springer (Firm))
    schema:isSimilarTo <http://www.worldcat.org/oclc/939531679> ;
    schema:name "Physical-layer security for cooperative relay networks"@en ;
    schema:productID "947961176" ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1231570> ;
    schema:url <http://sfx.carli.illinois.edu/sfxwhe/sfx_local?genre=book&sid=Voyager:WHE&sfx.ignore_date_threshold=1&svc.fulltext=yes&rft.isbn=978-3-319-31174-6> ;
    schema:url <http://dx.doi.org/10.1007/978-3-319-31174-6> ;
    schema:url <https://login.proxy.lib.strath.ac.uk/login?url=http://link.springer.com/10.1007/978-3-319-31174-6> ;
    schema:url <http://proxy.library.carleton.ca/login?url=http://link.springer.com/10.1007/978-3-319-31174-6> ;
    schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-319-31173-9> ;
    schema:url <http://gate.lib.buffalo.edu/login?url=https://link.springer.com/book/10.1007/978-3-319-31174-6> ;
    schema:url <https://login.libproxy.noctrl.edu/login?url=http://link.springer.com/10.1007/978-3-319-31174-6> ;
    schema:url <https://grinnell.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-31174-6> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=4510555> ;
    schema:url <http://proxy.artic.edu/login?url=http://link.springer.com/10.1007/978-3-319-31174-6> ;
    schema:url <https://proxy1.library.eiu.edu/login?url=http://link.springer.com/10.1007/978-3-319-31174-6> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/book/10.1007/978-3-319-31174-6> ;
    schema:url <http://link.springer.com/10.1007/978-3-319-31174-6> ;
    schema:url <http://rave.ohiolink.edu/ebooks/ebc/9783319311746> ;
    schema:url <http://ebookcentral.proquest.com/lib/illcencol-ebooks/detail.action?docID=4510555> ;
    schema:url <http://ebookcentral.proquest.com/lib/ucm/detail.action?docID=4510555> ;
    schema:url <https://login.libproxy.uregina.ca:8443/login?url=https://link.springer.com/openurl?genre=book&isbn=978-3-319-31173-9> ;
    schema:url <http://proxy.library.carleton.ca/login?url=http://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks3/springer/2017-08-17/11/9783319311746> ;
    schema:url <http://libproxy.uwinnipeg.ca/login?url=http://link.springer.com/10.1007/978-3-319-31174-6> ;
    schema:url <http://er.llcc.edu:2048/login?url=http://link.springer.com/10.1007/978-3-319-31174-6> ;
    schema:url <http://www.myilibrary.com?id=921385> ;
    schema:workExample <http://worldcat.org/isbn/9783319311746> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-319-31174-6> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/947961176> ;
    .


Related Entities

<http://ebookcentral.proquest.com/lib/illcencol-ebooks/detail.action?docID=4510555>
    rdfs:comment "Available for ICC via Ebook Central. Click here to access." ;
    .

<http://experiment.worldcat.org/entity/work/data/2923113021#Person/zou_yulong> # Yulong Zou
    a schema:Person ;
    schema:familyName "Zou" ;
    schema:givenName "Yulong" ;
    schema:name "Yulong Zou" ;
    .

<http://experiment.worldcat.org/entity/work/data/2923113021#Series/wireless_networks_springer_firm> # Wireless networks (Springer (Firm))
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/947961176> ; # Physical-layer security for cooperative relay networks
    schema:name "Wireless networks (Springer (Firm))" ;
    .

<http://experiment.worldcat.org/entity/work/data/2923113021#Topic/data_encryption_computer_science> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2923113021#Topic/wireless_communication_systems_security_measures> # Wireless communication systems--Security measures
    a schema:Intangible ;
    schema:name "Wireless communication systems--Security measures"@en ;
    .

<http://link.springer.com/openurl?genre=book&isbn=978-3-319-31173-9>
    rdfs:comment "Springer eBooks (Computer Science 2016)" ;
    .

<http://worldcat.org/isbn/9783319311746>
    a schema:ProductModel ;
    schema:isbn "3319311743" ;
    schema:isbn "9783319311746" ;
    .

<http://worldcat.org/issn/2366-1445> # Wireless networks,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/947961176> ; # Physical-layer security for cooperative relay networks
    schema:issn "2366-1445" ;
    schema:name "Wireless networks," ;
    .

<http://www.worldcat.org/oclc/939531679>
    a schema:CreativeWork ;
    rdfs:label "Physical-layer security for cooperative relay networks." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/947961176> ; # Physical-layer security for cooperative relay networks
    .

<https://login.libproxy.uregina.ca:8443/login?url=https://link.springer.com/openurl?genre=book&isbn=978-3-319-31173-9>
    rdfs:comment "Full text available from SpringerLINK ebooks - Computer Science (2016)" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.