skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Physical layer security in wireless cooperative networks Preview this item
ClosePreview this item
Checking...

Physical layer security in wireless cooperative networks

Author: Li Wang
Publisher: Cham, Switzerland : Springer, [2018]
Series: Wireless networks (En ligne); Wireless networks (Springer (Firm) : En ligne)
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Li Wang
ISBN: 9783319618630 3319618636
OCLC Number: 1132108192
Description: 1 ressource en ligne : fichiers PDF.
Contents: 1 Introduction --
2 Existing Techniques in Physical Layer Security --
3 Secrecy Analysis with Time-Reversal Technique in Distributed Transmission System --
4 Spatial Modulation in Physical Layer Security --
5 Cooperative Security in D2D Communications --
6 Summary.
Series Title: Wireless networks (En ligne); Wireless networks (Springer (Firm) : En ligne)
Responsibility: Li Wang.

Abstract:

This book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath channel environment. Resource allocation strategies to enhance secrecy performance in D2D communications are also discussed in this book. It contributes to formulating user social behaviors and utilizing social characteristics to improve the secrecy performance in wireless cooperative networks. This book not only analyzes the secrecy enhancement with certain techniques, but also pursues to find the relationships or tradeoffs among the secrecy performance, energy consumption, channel conditions, and other essential factors in wireless communications. This book targets researchers and professionals specializing in electronic engineering, computer science, wireless communications and networks. Advanced level students in electrical engineering and computer science will also find this book useful as a secondary text.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1132108192<\/a>> # Physical layer security in wireless cooperative networks<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a>, schema:MediaObject<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1132108192<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/sz<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/621.382\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4486431744#Topic\/transmission_sans_fil_securite_mesures<\/a>> ; # Transmission sans fil--S\u00E9curit\u00E9--Mesures<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4486431744#Person\/wang_li<\/a>> ; # Li Wang<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2018<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"1 Introduction -- 2 Existing Techniques in Physical Layer Security -- 3 Secrecy Analysis with Time-Reversal Technique in Distributed Transmission System -- 4 Spatial Modulation in Physical Layer Security -- 5 Cooperative Security in D2D Communications -- 6 Summary.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"This book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath channel environment. Resource allocation strategies to enhance secrecy performance in D2D communications are also discussed in this book. It contributes to formulating user social behaviors and utilizing social characteristics to improve the secrecy performance in wireless cooperative networks. This book not only analyzes the secrecy enhancement with certain techniques, but also pursues to find the relationships or tradeoffs among the secrecy performance, energy consumption, channel conditions, and other essential factors in wireless communications. This book targets researchers and professionals specializing in electronic engineering, computer science, wireless communications and networks. Advanced level students in electrical engineering and computer science will also find this book useful as a secondary text.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/4486431744<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4486431744#Series\/wireless_networks_springer_firm_en_ligne<\/a>> ; # Wireless networks (Springer (Firm) : En ligne)<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4486431744#Series\/wireless_networks_en_ligne<\/a>> ; # Wireless networks (En ligne)<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4486431744#Series\/wireless_networks<\/a>> ; # Wireless networks<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Physical layer security in wireless cooperative networks<\/span>\" ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1132108192<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/dx.doi.org\/10.1007\/978-3-319-61863-0<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783319618630<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1132108192<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/621.382\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4486431744#Person\/wang_li<\/a>> # Li Wang<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Wang<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Li<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Li Wang<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4486431744#Series\/wireless_networks<\/a>> # Wireless networks<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1132108192<\/a>> ; # Physical layer security in wireless cooperative networks<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Wireless networks<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4486431744#Series\/wireless_networks_en_ligne<\/a>> # Wireless networks (En ligne)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1132108192<\/a>> ; # Physical layer security in wireless cooperative networks<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Wireless networks (En ligne)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4486431744#Series\/wireless_networks_springer_firm_en_ligne<\/a>> # Wireless networks (Springer (Firm) : En ligne)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1132108192<\/a>> ; # Physical layer security in wireless cooperative networks<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Wireless networks (Springer (Firm) : En ligne)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4486431744#Topic\/transmission_sans_fil_securite_mesures<\/a>> # Transmission sans fil--S\u00E9curit\u00E9--Mesures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Transmission sans fil--S\u00E9curit\u00E9--Mesures<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/sz<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"sz<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783319618630<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3319618636<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783319618630<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n