Physical layer security in random cellular networks. ([2016])
- Record Type:
- Book
- Title:
- Physical layer security in random cellular networks. ([2016])
- Main Title:
- Physical layer security in random cellular networks
- Further Information:
- Note: Hui-Ming Wang, Tong-Xing Zheng.
- Authors:
- Wang, Hui-ming
Zheng, Tong-Xing - Contents:
- Preface; Acknowledgments; Contents; Acronyms; Notations; 1 Wireless Physical Layer Security; 1.1 Information-Theoretic Security; 1.1.1 Encryption; 1.1.2 Physical Layer Security; 1.2 Fundamentals of Information-Theoretic Security; 1.2.1 Shannon's Perfect Secrecy; 1.2.2 Wyner's Secrecy Conditions; 1.3 Secrecy Metrics; 1.3.1 Secrecy Capacity/Rate; 1.3.2 Ergodic Secrecy Capacity/Rate; 1.3.3 Secrecy Outage/Throughput; 1.3.4 Wyner's Wiretap Code; 1.4 Existing Techniques in Physical Layer Security; 1.4.1 MIMO; 1.4.2 Node Cooperation; 1.4.3 Full-Duplex Transceiver; 1.5 Summary; References. 2 Random Cellular Networks and Stochastic Geometry2.1 Deployment of Cellular Networks; 2.1.1 Modeling and Analyzing Random Cellular Networks; 2.1.2 Stochastic Geometry Approach; 2.2 Fundamentals of Stochastic Geometry; 2.2.1 Point Process; 2.2.2 Poisson Point Process; 2.3 Using Stochastic Geometry to Model Wireless Networks; 2.3.1 Cellular Networks; 2.3.2 Heterogeneous Cellular Networks; 2.3.3 Wireless Ad hoc Networks; 2.4 Interference Characterization; 2.5 Physical Layer Security in Random Cellular Networks; 2.5.1 Connection Outage and Secrecy Outage; 2.5.2 Secrecy Throughput. 2.5.3 Network-Wide Secrecy Throughput2.5.4 A Brief Survey on Physical Layer Security in Wireless Networks; References; 3 Physical Layer Security in Cellular Networks Under TDMA; 3.1 Introduction; 3.2 System Model; 3.2.1 AN-Aided Secrecy Signaling; 3.2.2 On -- Off Secrecy Transmission Strategy; 3.3 Secrecy Outage ProbabilityPreface; Acknowledgments; Contents; Acronyms; Notations; 1 Wireless Physical Layer Security; 1.1 Information-Theoretic Security; 1.1.1 Encryption; 1.1.2 Physical Layer Security; 1.2 Fundamentals of Information-Theoretic Security; 1.2.1 Shannon's Perfect Secrecy; 1.2.2 Wyner's Secrecy Conditions; 1.3 Secrecy Metrics; 1.3.1 Secrecy Capacity/Rate; 1.3.2 Ergodic Secrecy Capacity/Rate; 1.3.3 Secrecy Outage/Throughput; 1.3.4 Wyner's Wiretap Code; 1.4 Existing Techniques in Physical Layer Security; 1.4.1 MIMO; 1.4.2 Node Cooperation; 1.4.3 Full-Duplex Transceiver; 1.5 Summary; References. 2 Random Cellular Networks and Stochastic Geometry2.1 Deployment of Cellular Networks; 2.1.1 Modeling and Analyzing Random Cellular Networks; 2.1.2 Stochastic Geometry Approach; 2.2 Fundamentals of Stochastic Geometry; 2.2.1 Point Process; 2.2.2 Poisson Point Process; 2.3 Using Stochastic Geometry to Model Wireless Networks; 2.3.1 Cellular Networks; 2.3.2 Heterogeneous Cellular Networks; 2.3.3 Wireless Ad hoc Networks; 2.4 Interference Characterization; 2.5 Physical Layer Security in Random Cellular Networks; 2.5.1 Connection Outage and Secrecy Outage; 2.5.2 Secrecy Throughput. 2.5.3 Network-Wide Secrecy Throughput2.5.4 A Brief Survey on Physical Layer Security in Wireless Networks; References; 3 Physical Layer Security in Cellular Networks Under TDMA; 3.1 Introduction; 3.2 System Model; 3.2.1 AN-Aided Secrecy Signaling; 3.2.2 On -- Off Secrecy Transmission Strategy; 3.3 Secrecy Outage Probability Minimization; 3.4 Secrecy Throughput Maximization; 3.4.1 Dynamic Parameter Transmission Scheme; 3.4.2 Static Parameter Transmission Scheme; 3.5 Simulations; 3.5.1 Outage-Optimal Power Allocation; 3.5.2 Secrecy Throughput Optimization for DPTS and SPTS. 3.5.3 Comparison Between DPTS and SPTS3.6 Conclusions; References; 4 Physical Layer Security in Heterogeneous Cellular Network; 4.1 Introduction; 4.2 System Model; 4.2.1 Cellular Deployment and Channel Model; 4.2.2 Secure Transmission Signaling; 4.2.3 Secrecy Mobile Association Policy; 4.3 Secrecy Performance Analysis; 4.3.1 User Connection Probability; 4.3.2 User Secrecy Probability; 4.3.3 Network Secrecy Throughput; 4.3.4 Average User Secrecy Throughput; 4.4 Conclusions; References; 5 Physical Layer Security in Heterogeneous Ad hoc Networks with Full-Duplex Receivers; 5.1 Introduction. 5.2 System Model5.2.1 Heterogeneous Ad hoc Networks; 5.2.2 Signal Model; 5.2.3 Performance Metrics; 5.3 Single-Antenna-Jamming FD Receiver; 5.3.1 Connection Probability; 5.3.2 Secrecy Outage Probability; 5.3.3 Network-Wide Secrecy Throughput; 5.4 Multi-antenna Jamming FD Receiver; 5.4.1 Connection Probability; 5.4.2 Secrecy Outage Probability; 5.4.3 Network-Wide Secrecy Throughput; 5.5 Conclusions; References; 6 Conclusions and Future Research Directions; 6.1 Conclusions; 6.2 Future Research Directions. … (more)
- Publisher Details:
- Singapore, Singapore : Springer
- Publication Date:
- 2016
- Extent:
- 1 online resource (xviii, 113 pages)
- Subjects:
- 005.8
Computer networks -- Security measures
Wireless communication systems -- Security measures
COMPUTERS -- Security -- General
Computer networks -- Security measures
Wireless communication systems -- Security measures
Computer Science
Computer Communication Networks
Electronic books - Languages:
- English
- ISBNs:
- 9789811015755
9811015759 - Related ISBNs:
- 9789811015748
9811015740 - Notes:
- Note: Includes bibliographical references.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.405279
- Ingest File:
- 02_471.xml