Physical layer approaches for securing wireless communication systems:
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV040915941 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 130327s2013 xx o|||| 00||| eng d | ||
015 | |a 13,O03 |2 dnb | ||
016 | 7 | |a 1031317872 |2 DE-101 | |
020 | |a 9781461465096 |9 978-1-4614-6509-6 | ||
020 | |a 9781461465102 |c Online |9 978-1-4614-6510-2 | ||
024 | 7 | |a 10.1007/978-1-4614-6510-2 |2 doi | |
024 | 3 | |a 9781461465102 | |
035 | |a (OCoLC)839974556 | ||
035 | |a (DE-599)DNB1031317872 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 004.6 | |
100 | 1 | |a Wen, Hong |e Verfasser |4 aut | |
245 | 1 | 0 | |a Physical layer approaches for securing wireless communication systems |c Hong Wen |
264 | 1 | |a New York, NY [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in computer science | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4614-6510-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025895174&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025895174&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025895174 | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6510-2 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6510-2 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6510-2 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6510-2 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6510-2 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6510-2 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6510-2 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6510-2 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6510-2 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6510-2 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6510-2 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1819376769762852864 |
---|---|
adam_text | PHYSICAL LAYER APPROACHES FOR SECURING WIRELESS COMMUNICATION SYSTEMS
/ WEN, HONG
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTIONFOR PHY SECURITY
UNCONDITIONAL SECURITY WIRELESS COMMUNICATION
MIMO BASED ENHANCEMENT FOR WIRELESS COMMUNICATION SECURITY
PHYSICAL LAYER ASSISTED AUTHENTICATION FOR WIRELESS SENSOR NETWORKS
DETECTION OF NODE CLONE AND SYBIL ATTACK BASED ON CI APPROACH
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
PHYSICAL LAYER APPROACHES FOR SECURING WIRELESS COMMUNICATION SYSTEMS
/ WEN, HONG
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK SURVEYS THE OUTSTANDING WORK OF PHYSICAL-LAYER (PHY) SECURITY,
INCLUDING THE RECENT ACHIEVEMENTS OF CONFIDENTIALITY AND
AUTHENTICATION FOR WIRELESS COMMUNICATION SYSTEMS BY CHANNEL
IDENTIFICATION. A PRACTICAL APPROACH TO BUILDING UNCONDITIONAL
CONFIDENTIALITY FOR WIRELESS COMMUNICATION SECURITY BY FEEDBACK AND
ERROR CORRECTING CODE IS INTRODUCED AND A FRAMEWORK OF PHY SECURITY
BASED ON SPACE TIME BLOCK CODE (STBC) MIMO SYSTEM IS DEMONSTRATED.
ALSO DISCUSSED IS A SCHEME WHICH COMBINES CRYPTOGRAPHIC TECHNIQUES
IMPLEMENTED IN THE HIGHER LAYER WITH THE PHYSICAL LAYER SECURITY
APPROACH USING REDUNDANT ANTENNAS OF MIMO SYSTEMS TO PROVIDE STRONGER
SECURITY FOR WIRELESS NETWORKS. THE CHANNEL RESPONSES BETWEEN
COMMUNICATION PEERS HAVE BEEN EXPLORED AS A FORM OF FINGERPRINT WITH
SPATIAL AND TEMPORAL UNIQUENESS. FINALLY, THE BOOK DEVELOPS A NEW
LIGHTWEIGHT METHOD OF CHANNEL IDENTIFICATION FOR SYBIL ATTACK AND NODE
CLONE DETECTION IN WIRELESS SENSOR NETWORKS (WSNS)
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Wen, Hong |
author_facet | Wen, Hong |
author_role | aut |
author_sort | Wen, Hong |
author_variant | h w hw |
building | Verbundindex |
bvnumber | BV040915941 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)839974556 (DE-599)DNB1031317872 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4614-6510-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02743nam a2200517zc 4500</leader><controlfield tag="001">BV040915941</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130327s2013 xx o|||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,O03</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1031317872</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461465096</subfield><subfield code="9">978-1-4614-6509-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461465102</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4614-6510-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4614-6510-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781461465102</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)839974556</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1031317872</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wen, Hong</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Physical layer approaches for securing wireless communication systems</subfield><subfield code="c">Hong Wen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in computer science</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025895174&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025895174&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025895174</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6510-2</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV040915941 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T16:27:06Z |
institution | BVB |
isbn | 9781461465096 9781461465102 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025895174 |
oclc_num | 839974556 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-2-SCS |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs in computer science |
spellingShingle | Wen, Hong Physical layer approaches for securing wireless communication systems |
title | Physical layer approaches for securing wireless communication systems |
title_auth | Physical layer approaches for securing wireless communication systems |
title_exact_search | Physical layer approaches for securing wireless communication systems |
title_full | Physical layer approaches for securing wireless communication systems Hong Wen |
title_fullStr | Physical layer approaches for securing wireless communication systems Hong Wen |
title_full_unstemmed | Physical layer approaches for securing wireless communication systems Hong Wen |
title_short | Physical layer approaches for securing wireless communication systems |
title_sort | physical layer approaches for securing wireless communication systems |
url | https://doi.org/10.1007/978-1-4614-6510-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025895174&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025895174&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT wenhong physicallayerapproachesforsecuringwirelesscommunicationsystems |