实例介绍
本书是PDF版本,详细讲解了无线通信中物理层安全方面的相关知识。对进行相关方面研究的科研人员来讲具有十分好的参考价值。
WIRELESS NETWORKS AND MOBILE COMMUNICATIONS Dr Yan Zhang, Series Editor Simula Research Laboratory, Norway E-mail: yanzhang@ieee. org Broadband mobile multimedia Physical Layer security in wireless Techniques and Applications Communications Yan Zhang, Shiwen Mao, Laurence T Yang, Xiangyun Zhou, Lingyang Song, and Yan Zhang and Thomas m. chen sB№:978-1-4665-6700-9 SEN:978-1-4200-5184-1 Resource, Mobility, and security Cognitive Radio Networks: Architectures, Management in Wireless Networks and Protocols, and standards Mobile communications Yan Zhang, Jun Zheng, and Hsiao-Hwa Chen Yan Zhang, Honglin Hu, and Masayuki Fujise SBN:978-1-4200-7775-9 lsBN:978-0-8493-8036-5 Cooperative wireless Communications RFID and sensor Networks Yan Zhang, Hsiao-Hwa Chen, Architectures, Protocols, security and and Mohsen guizani Integrations SBN:978-1-42006469-8 Yan Zhang, Laurence T Yang and JimIng Chen Delay Tolerant Networks: Protocols and sBN:g78-1-42007777-3 Applicati。ns Security in RFID and Sensor Networks Athanasios V. Vasilakos, Yan Zhang, and Yan Zhang and Paris kitsos Thrasyvoulos Spyropoulos sEN:978-1-4200-6839-9 SBN:978-1-4200-11085 Security in Wireless Mesh Networks Distributed Antenna Systems: Open Yan Zhang Jun Zheng, and Honglin Hu Architecture for future wireless SBN:978-084938250-5 Communications Unlicensed Mobile Access Technology: Honglin Hu, Yan Zhang, and Jiun Luo Protocols, Architectures, Security sBN:978-1-4200-4288-7 Standards, and Applications Game Theory for wireless Yan Zhang, Laurence T Yang, and Jianhua Ma Communications and Networking SBN:978-1-42005537-5 Yan Zhang SBN:978-1-4398-08894 WiMAX Network Planning and Optimization The Internet of Things: From RFID to the Yan Zhang Next-Generation pervasive networked SBN:9781420066623 Systems Wireless Ad Hoc Networking: Personal- Lu Yan, Yan Zhang, Laurence T Yang Area, Local-Area, and the sensory-Area and Huansheng Ning Networks SEN:978-1-4200-5281-7 Shih-Lin Wu, Yu-Chee Tseng, and Hsin-Chu Millimeter Wave Technology in Wireless SB№:9780-84939254-2 PAN LAN and man wireless Mesh Networking: Architectures, Shao-Qiu Xiao, Ming-Tuo Zhou, Protocols, and standards and Yan Zhang Yan zhang, Jiun Luo, and Honglin Hu lsBN:978-0-8493-8227-7 SBN:978-0-8493-7399-2 Mobile wimax toward broadband Wireless Quality-of-Service: Techniques Wireless Metropolitan Area Networks Standards, and Applications Yan Zhang and Hsiao-Hwa chen SBN:978-0-8493-2624-0 Maode Ma, Mieso K Denko, and Yan zhang sBN:9781-4200-5130-8 Orthogonal Frequency Division Multiple Access Fundamentals and Applications Tao Jiang, Lingyang Song, and Yan Zhang SBN:978-1-4200-8824-3 a2014 by Taylor Francis Group, LLC Physical Layer Security in Wireless Communications Edited by Xiangyun Zhou. Lingyang Song Yan Zhang CRC) CRC Press Boca Raton Londo York CRC Press is an imprint of the Taylor Francis Group, an informa business a2014 by Taylor& Francis Group, LLC CRC Press Taylor& Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca raton fl 33487-2742 32014 by Taylor Francis Group, LLC CRC Press is an imprint of Taylor Francis Group, an Informa business No claim to original U.S. Government works Version date: 20131004 International Standard Book Number-13: 978-1-4665-6701-6(eBook-PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable fforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers Forpermissiontophotocopyorusematerialelectronicallyfromthisworkpleaseaccesswww.copy rightcom(http://www.copyright.com/)orcontacttheCopyrightClearanceCenterInc.(ccc),222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro vides licenses and registration for a variety of users. For organizations that have been granted a pho tocopy license by the CCC, a separate system of payment has been arranged Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe Visit the Taylor Francis Web site at http://www.taylorandfrancis.com and the crC Press web site at http://www.crcpress.com c 2014 by Taylor Francis Group, LLC Contents Preface Authors i Contributors 1 Fundamentals of Physical Layer Security 1.1 Information-theoretic Secrecy ■1 1.1.1 Shannon's Cipher System and Perfect Secrecy 1.1.2 Information-theoretic Secrecy Metrics 1.2 Secret Communication over Noisy Channels 1.2.1 Wiretap Channel Model 1223446 1. 2.2 Coding Mechanisms for Secret Communication 1.3 Secret-key Generation from Noisy Channels 1.3.1 Channel Model for Secret-key Generation 10 1.3.2 Coding Mechanisms for Secret-key Generation 12 1.4 Conclusion..:,,。,,....,.....,.。, 13 References 14 2 Coding for Wiretap Channels 17 2.1 Coding for the Wiretap Channel Il 17 2.1.1 Basics of Error-Correcting Codes 18 2.12wi As 2 2.2 Wiretap Coding with Polar Codes 23 2.2.1 Polar codes 23 2.2.2 Polar Wiretap Codes 26 2.3 Coding for Gaussian Wiretap Channels a:-1m:4a4 27 2.3. 1 Error Probability and Secrecy Gain 27 2.3.2 Unimodular lattice Codes 2. 4 Conclusion 31 Acknowledgment 31 R pretences 3 LDPC Codes for the Gaussian Wiretap Channel 33 3. 1 Channel Model and Basic Notions 3 3.2 Coding for Security 3.2.1 Asymptotic Analysis 3.2.2 Optimized Puncturing Distributions 40 3.2.3 Reducing SNR Loss 40 3. 2.4 Finite Block lengths 42 a2014 by Taylor& Francis Group, LLC onlenD 3.3 System Aspects 3.4 Concluding remarks References 45 4 Key Generation from Wireless Channels 47 4.1 Introd 47 4.2 Information-theoretic Models for Key generation 49 4. 2.1 Key generation via Unlimited Public discussion 49 4.2.2 Key Generation with Rate Constraint in Public Discussion 51 4.2.3 Key Generation with Side-information at Eve 51 4.3 Basic Approaches for Key Generation via Wireless Networks 52 4.4 A Joint Source-Channel Key Agreement Protocol 54 4.4.1 Key Agreement with a Public Channel 54 4.4.2 Key agreement without a Public Channel 56 4.5 Relay-assisted Key Generation with a Public Channel 59 4.5.1 Relay-assisted Key generation with One relay 4.5.2 Relay-assisted Key Generation with Multiple relays 61 4.5.3 Relav-oblivious Key Generation 62 4.6 Key Agreement with the Presence of an Active Attacker 63 4.6.1 Training Phase 63 4.6.2 Key generation phase 65 4.7 Conclusion 66 4.8 Acknowledgment 6了 References 6了 Secrecy with Feedback 69 5.1 Introduction 69 5.2 The Gaussian Two-way Wiretap Channel 5.3 Achieving Secrecy Using Public Di CUSSON 5.4 Achieving Secrecy Using Cooperative Jamming 5.4.1 Full-duplex node 542 Half-duplex Node.:......,......:.. 74 5.5 Achieving Secrecy through Discussion and Jamming 5.5.1 amming with Codewords 5.5.2 Secrecy through Key Generation 78 5.5.3 Block Markov Coding sc cheme a ..,a 5. 6 When the Eavesdropper Channel States Are Not Known .........., 82 5.7 Converse 5.7.1 Outer Bounds 5.7.2 Discussion 8 5.8 Conclusion 87 5.9 Proof of Theorem 5.7.5 5.10 Proof of Theorem 5.7.6 89 References 6 MIMO Signal Processing Algorithms for Enhanced Physical Layer Security 93 6.1 Introduction 94 6.2 Physical Layer Security 6.2.1 Signal Processing Aspects 94 6.2.2 Secrecy Performance Metrics 95 @2014 by Taylor Francis Group, LLC Contents 6.2.3 The Role of CSI 95 6.3 MIMO Wiretap Channels 6.3.1 Complete CSI 97 6.3.2 Partial CSI 98 6.4 MIMO Wiretap Channel with an External Helper 6.5 MIMO Broadcast Channel .101 6.6 MIMO Interference Channel 103 6.7 MIMO Relay Wiretap Networks 107 6.7.1 Relay-aided Cooperation 107 6.7.2 Untrusted relaying 。.109 6. 8 Conclusions ,,....,.110 References::.· 10 7 Discriminatory Channel Estimation for Secure Wireless Communication 115 7.1 Introduction 115 7. 2 Discriminatory Channel Estimation--Basic Concept 117 7. 3 DCE via Feedback and Retraining l18 7.3. 1 Two-Stage Feedback-and-Retraining 118 7.3.2 Multiple-stage Feedback and Retraining 123 7.3.3 Simulation Results and Discussions ,124 7.4 Discriminatory Channel Estimation via Two-way Training 126 7.4.1 Two-way DCE Design for Reciprocal C alle .126 7.4.2 Two-way DCE Design for Nonreciprocal Channels Q 7. 4.3 Simulation Results and Discussions 131 7.5 Conclusions and Discussions Acknowledgment 135 References 135 8 Physical Layer Security in OFDMA Networks 137 8.1 Introduction。 137 8.2 Related Works on Secure OFDM/OFDM Networks 138 8.2.1 Secure OFDM Channel 138 8.2.2 Secure OFDMA Cellular Networks 140 8.2.3 Secure OFDMA Relay Networks 140 8.2.4 Secure OFDM with Implementation Issues.............. 140 8.3 Basics of Resource Allocation for Secret Communications 141 8.3.1 Power Allocation Law for Secrecy 141 8.3.2 Multiple Eavesdroppers 141 8.4 Resource Allocation for Physical Layer Security in OFDMA Networks .. 142 8.4.1 Problem Formulation 8.4.2 Optimal Policy 144 8. 4.3 Suboptimal Algorithm 146 844 Complexity:· l47 8.4.5 Numerical Examples 147 8.4.6 Discussion on False CSI Feedback 149 8.5 Conclusions and Open Issues ..... 149 References .:..150 a2014 by Taylor& Francis Group, LLC onlenD 9 The Application of Cooperative Transmissions to Secrecy Communications 153 9.1 Introduction 153 9.2 When All Nodes Are Equipped with a Single Antenna 154 9.2.1 Cooperative Jammin 155 9.2.2 Relay Chatting 157 9.3 MIMO Relay Secrecy Communication Scenarios 163 9.3.1 When CSI of Eavesdroppers Is Known 163 9.3.2 When CSI of Eavesdroppers Is Unknown 168 9.4 Conclusion 175 Acknowledgment 175 References 175 10 Game Theory for Physical Layer Security on Interference Channels 179 10.1 Introduction 179 10.2 System Models and Scenarios .181 10.2.1 Standard MISO Interference Channel 182 10.2.2 MISO Interference Channel with Private Messages 183 10.2.3 MISO Interference Channel with Public Feed back and Private escapes 18 10.2.4 Discussion and Comparison of Scenarios 187 10.3 Noncooperative Solutions 18 10.3. 1 Noncooperative Games in Strategic Form 18 10.3.2 Solution for the Miso Interference Channel Scenarios 191 10.4 Cooperative Solutions 192 10.4.1 Bargaining Solutions 193 10.4.2 Nash Bargaining Solution 195 10.4.3 Bargaining Algorithm in the Edgeworth Box 196 10.4.4 Walras equilibrium Solution 196 10.5 Illustrations and discussions 199 10.5.1 Comparison of Utility Regions 199 10.5.2 Noncooperative and Cooperative Operating Points.......... 200 10.5.3 Bargaining Algorithm Behavior 201 10. 6 Conclusions 202 Acknowledgment 203 10.7 Appendix: Proofs 203 10.7.1 Proof of Theorem 10.3.1 .203 10.7.2 Proof of Theorem 104.1 204 10.7. 3 Proof of Theorem 10.4.2 205 10.7.4 Proof of Theorem 10.4.3 205 References 206 11 Ascending Clock Auction for Physical Layer Security 2o9 11.1 Introduction 210 11.1.1 Cooperative Jamming for Physical Layer Security ......... 210 11.1.2 Game Theory-based Jamming Power Allocation 211 11.1.3 Ascending Auctions 211 Il.1. 4 Chapter Outline ....:212 11.2 System Model and Problen Formulation ,212 11.2.1 System Model 212 11.2.2 Sources Utility Function 214 a2014 by Taylor Francis Group, LLC Contents 11.2.3 Jammers Utility Function 215 11.3 Auction-based Jamming power Allocation Schemes 215 11.3.1 Power Allocation Scheme based on Single Object Pay-as-Bid Ascending Clock Auction(P-ACA-S) 215 11.3.2 Power Allocation Scheme based on Traditional Ascending Clock Auction(P-ACA-T) a .216 11.3.3 Power Allocation Scheme based on Alternative Ascending Clock Auction (P-ACA-A) ,.218 11.4 Properties of the Proposed Auction-based Power Allocation Schemes 219 11.4.1 Optimal amming Power for Each Source .............. 220 11.4.2 Convergence .221 11.4.3 Cheat-proof 223 11.4.4 Social welfare maximization 226 11.4.5 Complexity and Overhead 229 11.5 Conclusions and Open Issues ................ 232 References 2:34 12 Relay and Jammer Cooperation as a Coalitional Game 237 12.1 Introduction...······· 237 12.1.1 Cooperative Relaying and Cooperative jamming 237 12.1.2 Relay and Jammer Selection 238 12.1.3 Coalitional Game Theory 239 12.1.4 Chapter Outline 240 12.2 System Model and Problem Formulation 240 12.3 Relay and Jammer Cooperation as a Coalitional Game 242 12.3.1 Coalitional Game Definition 242 12.3.2 Properties of the Proposed Coalitional G 244 12.4 Coalition Formation Algorithm 245 12.4.1 Coalition Formation Concepts 245 12.4.2 Merge-and-split Coalition Formation Algorithm 246 12.5 Conclusions and Open Issues 248 References 11 249 13 Stochastic Geometry Approaches to Secrecy in Large Wireless Network 253 13.1 Introduction 253 13.1.1 Motivation 253 13.1.2 Stochastic Geometry Approaches 254 13.2 Secrecy Graph 255 13.2.1 Network and Graph Model 255 13.2.2 Local Connectivity Properties 256 13.2.3 Global Connectivity Properties 258 13.2.4 Connectivity Enhancements 260 13.3 Secrecy Transmission Capacity 262 13.3.1 Network model 262 13.3.2 Capacity Formulation 262 13.3.3Ⅲ strative Example..,,,,,,,,,,,,,,,,,, .,264 13.4 Current Limitations and Future Directions 268 References .269 a2014 by Taylor Francis Group, LLC 【实例截图】
【核心代码】
标签:
小贴士
感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。
- 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
- 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
- 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
- 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
关于好例子网
本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明
网友评论
我要评论